Vulnerability Management with (SCiocsadWAS)
Job Summary
Experience Level: 5 Years Job Type: Permanent
Vulnerability Management Lead:-
Job Summary We are looking for an experienced Senior Cybersecurity Consultant with deep expertise in Vulnerability Management (primary focus) and strong hands-on experience in Identity and Access Management (secondary focus). The ideal candidate will have a proven track record of end-to-end implementation of leading vulnerability management platforms (Tenable and Qualys) and IAM solutions (Okta CyberArk Azure IAM) along with solid experience in IT security operations and infrastructure hardening.
Key Responsibilities
Vulnerability Management (Primary Skill)
- Lead the full lifecycle implementation of enterprise vulnerability management programs using Qualys and Tenable platforms.
- Perform pre-sales and delivery activities including requirement gathering Proof-of-Concept (POC) design and demonstration (high POC-to-deal conversion expected).
- Prepare Statement of Work (SOW) High-Level Design (HLD) and Low-Level Design (LLD) documents.
- Deploy configure and operationalize the following solutions (on-prem cloud and hybrid models):
- Qualys VMDR Qualys WAS Policy Compliance (PC) SCA and Gateway Services
- Nessus Professional Nessus Network Monitor (NNM) Tenable Core
- Integrate vulnerability tools with existing SIEM ticketing and orchestration platforms.
- Ensure audit and regulatory compliance requirements (PCI-DSS ISO 27001 NIST etc.) are met during deployment.
- Conduct knowledge transfer and product training for customer teams post go-live.
- Manage asset discovery scanning policies dashboards reporting and remediation workflows.
Identity and Access Management (Secondary Skill)
- Design and implement enterprise IAM solutions using Okta CyberArk Privileged Access Management (PAM) and Microsoft Azure IAM/Entra ID.
- Build and support Single Sign-On (SSO) for SaaS and on-premises applications using SAML OIDC and federation protocols.
- Implement Multi-Factor Authentication (MFA) Identity Lifecycle Management provisioning/de-provisioning workflows and role-based access control (RBAC).
IT Security Operations & Infrastructure (Additional Scope)
- Design and implement firewall policies network security rules and secure remote access (SBL VPN EMS).
- Administer Microsoft 365 security & compliance features (eDiscovery DLP Defender suite).
- Manage Active Directory Group Policy Objects (GPO) VMware environments and ticketing tools.
- Create and maintain Standard Operating Procedures (SOPs) and security hardening guidelines.
Required Skills & Experience
Must-Have
- 5 years of hands-on experience in Vulnerability Management with primary expertise in Tenable (SC/io/cs/ad/WAS) and Qualys (VMDR WAS PC SCA).
SYNECHRONS DIVERSITY & INCLUSION STATEMENT
Diversity & Inclusion are fundamental to our culture and Synechron is proud to be an equal opportunity workplace and is an affirmative action employer. Our Diversity Equity and Inclusion (DEI) initiative Same Difference is committed to fostering an inclusive culture promoting equality diversity and an environment that is respectful to all. We strongly believe that a diverse workforce helps build stronger successful businesses as a global company. We encourage applicants from across diverse backgrounds race ethnicities religion age marital status gender sexual orientations or disabilities to apply. We empower our global workforce by offering flexible workplace arrangements mentoring internal mobility learning and development programs and more.
All employment decisions at Synechron are based on business needs job requirements and individual qualifications without regard to the applicants gender gender identity sexual orientation race ethnicity disabled or veteran status or any other characteristic protected by law.
About Company
Chez Synechron, nous croyons en la puissance du numérique pour transformer les entreprises en mieux. Notre cabinet de conseil mondial combine la créativité et la technologie innovante pour offrir des solutions numériques de premier plan. Les technologies progressistes et les stratégie ... View more