Closed or Expired Job Posting This job posting is closed or has expired and is no longer open for applications.
Upload
Job Description
- Guide the process of developing reverse engineering tools to enhance capabilities and detect vulnerabilities
- Guide the process of reviewing and analyzing cybersecurity threats to provide stakeholders with information needed to respond to threats
- Guide the process of reviewing gathered information for validity and relevance to the investigation in line with organizational Policies
- Guide the process of sanitizing reports to protect proprietary, commercial, personal or otherwise sensitive or confidential data or methods
- Guide the process of developing the VAPT plan
- Guide the process of designing and developing penetration testing team processes
- Guide the process of identifying systemic security issues based on the analysis of vulnerability and configuration data
- Identify critical infrastructure systems with information communication technology designed without system security considerations
- Interact with Regulatory bodies to identify new IOCs and communicate to internal teams
- Carry out other job related responsibilities as directed by his/ her Line Manager
Job Summary:
We are looking for a skilled Vulnerability Management & Active Defense Supervisor to oversee the identification, assessment, and mitigation of security vulnerabilities within our organization. The ideal candidate will be responsible for implementing proactive measures to protect our systems and data from potential cyber threats.
Job Responsibility:
1. Lead a team of security professionals in conducting regular vulnerability assessments and penetration testing.
2. Develop and implement strategies for proactive threat hunting and active defense measures.
3. Manage security incidents and coordinate responses to security breaches in a timely manner.
4. Provide technical expertise in vulnerability management tools and technologies.
5. Collaborate with cross-functional teams to ensure compliance with security policies and regulations.
Candidate Requirements:
1. Bachelor's degree in Computer Science, Information Technology, or a related field.
2. Proven experience in vulnerability management, penetration testing, and active defense strategies.
3. In-depth knowledge of common security frameworks and industry best practices.
4. Strong analytical and problem-solving skills.
5. Excellent communication and leadership abilities to effectively manage a team.
Skills
Leadership: Build Strategic Partnerships, Lead and Empower, Achieve Results, Drive Change
Behavioral: Commit to HSE Excellence, Champion Adaptability, Achieve with Excellence, Corporate & Build Sustainable Relations, Act with Care
Technical: Business Continuity, Regulatory and Government Compliance, Risk Identification & Assessment, Risk Management, Cybersecurity Planning, Cyber Security Threat Management, Cyber Security Monitoring and Reporting
Skills:
- Knowledge of vulnerability management tools and techniques
- Proficiency in performing risk assessments and prioritizing vulnerabilities
- Experience in implementing and managing security controls
- Strong understanding of network security principles and protocols
- Ability to lead a team and provide guidance on active defense strategies
- Excellent communication and interpersonal skills
- Critical thinking and problem-solving abilities
- Attention to detail and ability to analyze complex data
- Familiarity with compliance standards and regulations
- Continuous learning mindset to stay updated on the latest cybersecurity threats and trends