Experience Required: Minimum 7 years
Joining Timeline: Candidate should be available to join within 15–30 days; must be open to working UK hours
Perform scheduled and ad-hoc infrastructure vulnerability scans, assessments, and reporting across enterprise environments
Manage and triage scan-related issues; drive timely remediation
Collaborate with global teams and third-party vendors for effective vulnerability management
Communicate findings and actionable recommendations to internal stakeholders in a clear, business-friendly manner
Document and validate scan results comprehensively
Drive continuous improvement initiatives within the vulnerability management process
Must-Have Skills & Experience: 1. Domain ExpertiseProven experience conducting infrastructure vulnerability assessments in large enterprise environments
Strong understanding of vulnerability management lifecycle and best practices
2. Technical ProficiencyHands-on experience with industry-standard scanning tools (e.g., Tenable Nessus, Qualys, and Cloud-native tools)
Experience in vulnerability scanning across cloud platforms (AWS, Azure, or Alibaba Cloud)
Strong understanding of CIS Controls, OWASP Top 10, Threat Modelling, and NIST 800 series
Proficient in scripting/programming (Python, PowerShell, or C++)
Exposure to innovative vulnerability management solutions or enhancements
3. Education & CertificationsBachelor’s or Master’s degree in Computer Science, Cybersecurity, IT, or related fields
Good to have: Industry certifications like CISSP, CISM, CRISC, or OSCP
4. Communication & CollaborationAbility to communicate scan findings effectively to technical and non-technical stakeholders
Strong interpersonal skills; ability to work collaboratively in a cross-functional and multicultural environment
5. Analytical & Execution AbilitiesStrong problem-solving and analytical skills
Experience in triaging scan results and driving resolution independently
Ability to manage workload under pressure and deliver consistent outcomes
6. DocumentationSkilled in presenting scan outcomes and remediation strategies in a clear and concise manner
Preferred/Good to Have:Exposure to DevSecOps practices and secure software delivery pipelines
Solid foundational knowledge of operating systems, network protocols, and application development concepts