Team Lead managing vulnerability management processes and penetration testing activities in cybersecurity operations. Collaborating with cross-functional teams to ensure security standards compliance and risk mitigation.
Responsibilities
Conduct vulnerability assessments of infrastructure, including servers, networks, endpoints, and cloud environments, using tools like Qualys.
Prioritize vulnerabilities based on risk, business impact, and exploitability, aligning remediation efforts with organizational goals.
Develop action plans and collaborate with teams to remediate vulnerabilities effectively.
Front-end third-party penetration testing engagements, including defining scope, coordinating activities, and reviewing deliverables.
Ensure secure configurations and implement hardening guidelines across the IT environment.
Support blue and red teaming exercises to enhance the organization's defense mechanisms.
Developing policies, standards and procedures around Vulnerability Management and External Assessments.
Lead the incident response activities to contain, eradicate, and recover from cybersecurity incidents.
Utilize expertise in incident recovery to ensure a swift and efficient restoration of affected systems and services.
Requirements
8 – 10 years of progressive experience in vulnerability management, with exposure to penetration testing and IT infrastructure security.
Tools: Advanced knowledge of Qualys, Nessus, and other vulnerability management platforms.
Strong collaboration and communication skills to interface with internal teams and third parties effectively.
Analytical mindset for identifying vulnerabilities, assessing risks, and prioritizing remediation.
Ability to simplify technical risks for non-technical stakeholders.
Any experience Pen Testing with certifications such as OSCP, CEH, GPEN, or similar will have added advantage.
Ability to work independently and collaboratively in a fast-paced environment.
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.