Responsibilities
- Evaluate and rate vulnerabilities using available data sources, tools and leveraging new data sources as needed.
- Analyze environmental conditions as it relates to vulnerabilities, threat scenarios, and mitigating controls.
- Search systems of record and scan tool output to identify whether vulnerable products are present in our environment
- Manage reporting, tracking and research updates for “watch list” vulnerabilities
- Identification of data ingestion errors or quality concerns with intelligence feed and escalation to vendor for remediation
- Coordination with threat intelligence teams
- Confirmation of ratings with downstream stakeholders
- Participate in follow-the-sun handoff communications to ASVM teammates in other regions
Requirements
BE/BTECH/MCA/MSC (IT) equivalent (Any Technical Degree)
Certifications If Any : NA
:4+ Years
Foundational skills
- Broad knowledge of information security principles
- Understanding of Vulnerability Management principles and Risk Assessment methodologies
- Wide knowledge of application and IT products, interoperability, and IT security
- Familiarity with industry standard scoring models such as CVSS
- Familiarity with industry standard data models such as CPE
- Familiarity with OWASP Top 10 vulnerabilities, SANS 25, MITRE Attack, and CWEs
- Effective communication skills
- Process oriented with keen attention to detail
- Excellent analytical skills/problem solving/conceptual thinking
- Strong work ethic and ability to effectively multi-task in a fast-paced support environment
- Highly motivated and willing to learn
Desired Skills
- Experience as a Vulnerability or Threat Analyst
- Knowledge of vulnerability attack methods, exploit results, attack chains
- Experience operationalizing MITRE Attack & TTPs in vulnerability prioritization
- Knowledge of Linux and Windows Operating Systems
- Familiarity with basic program languages such as Python and Java
- Experience conducting vulnerability assessments, code reviews and penetration tests against system and application technologies, services, platforms and languages to find flaws and exploits
(e.g., SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, Clickjacking,Authentication/Authorization, - Knowledge of container/cloud risk management
Work Timings
1:30PM - 10:30PM (IST)