drjobs Cloud Operations Vulnerability Analyst

Cloud Operations Vulnerability Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Taguig - Philippines

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

The following are key responsibilities we are looking for BUT we are keen to recruit talented individuals who have a learning agility and looking to develop their career further.

Vulnerability Assessment:

  • Analyze vulnerability scan results to determine the severity and impact of identified vulnerabilities.

Remediation Planning:

  • Management and Monitoring of existing vulnerabilities status and remediation owners to closure
  • Collaborate with IT and security teams to develop and implement remediation plans.
  • Prioritize vulnerabilities based on risk and impact to the organization.

Mitigation and Resolution:

  • Apply patches updates and configuration changes to mitigate vulnerabilities.
  • Verify that vulnerabilities have been effectively addressed and no longer pose a threat.

Monitoring and Reporting:

  • Generate detailed reports on vulnerability status remediation progress and security metrics for management and stakeholders.

Documentation and Compliance:

  • Maintain thorough documentation of all vulnerability management activities.
  • Ensure compliance with relevant security standards regulations and best practices.

Incident Response:

  • Participate in incident response activities when vulnerabilities are exploited.
  • Assist in the investigation and resolution of security incidents.

Technical Skills:

  • Strong understanding of network and system security concepts.
  • Experience with patch management and system configuration.
  • Deep understanding of Windows Server and Windows client operating systems including security features and common vulnerabilities.
  • Familiarity with various Linux distributions (e.g. Red Hat Ubuntu CentOS) and Unix systems including command-line proficiency and security configurations.
  • Understanding of network security principles including segmentation VPNs and intrusion detection/prevention systems (IDS/IPS).
  • Knowledge of common cybersecurity threats and attack vectors including malware ransomware phishing and zero-day exploits.


Qualifications

Must haves:

  • At least 2-4 years of experience in vulnerability management information security or a related field.
  • Technical Background in Infrastructure preferably in Cloud

Person Specification

  • Bachelors degree in Computer Science Information Security Cybersecurity or a related field.
  • High level of attention to detail to ensure accurate identification and remediation of vulnerabilities.
  • Strong understanding of security principles standards and frameworks (e.g. CIS NIST ISO 27001).
  • Proactive approach to security constantly seeking to identify and mitigate potential risks before they can be exploited.
  • Excellent analytical and problem-solving skillsto address complex security issues.
  • Strong written and verbal communication skills with the ability to explain complex security issues to non-technical stakeholders.
  • Strong interpersonal skills with the ability to work effectively in a team environment and collaborate with various stakeholders.
  • Ability to quickly adapt to changing security landscapes and learn new tools and techniques as needed.

WTW is an Equal Opportunity Employer




Required Experience:

IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.