Enable job alerts via email!

Vulnerability Management Engineer

FANATICS INC

Hyderabad City Taluka

On-site

PKR 2,000,000 - 2,750,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm in Pakistan is seeking a Vulnerability Management Specialist to oversee vulnerability programs, conduct IT asset assessments, and collaborate on security policies. The ideal candidate will have over 2 years of experience in cybersecurity, strong analytical skills, and knowledge of vulnerability scanning tools like Tenable and Qualys. This role ensures the integrity of IT assets and supports incident response efforts.

Qualifications

  • 2+ years in vulnerability management, cybersecurity or related experience.
  • Familiarity with network protocols, operating systems, and cloud platforms (AWS, Azure, GCP).
  • Understanding of frameworks like NIST, OWASP.

Responsibilities

  • Manage vulnerability programs for IT assets and containers.
  • Conduct regular scans and analyze vulnerabilities.
  • Collaborate with IT and development teams for remediation.

Skills

Vulnerability management
Deep expertise with vulnerability scanning platforms
Knowledge of threat modeling
Strong critical thinking
Exceptional communication skills

Education

Bachelor’s degree in computer science or Information Systems
Certifications in Information Security (CEH, GIAC CPEN, etc.)

Tools

Tenable
Qualys
Tanium
Job description
Vulnerability Assessment & Management

Manage vulnerability programs for IT assets, containers (e.g., Docker, Kubernetes), and base golden images across operating systems (Windows, Linux, Unix).

Conduct regular scans using industry-standard tools.

Analyze and prioritize vulnerabilities based on risk, exploitability, and asset criticality.

Track and report remediation progress.

Security Operations

Collaborate with IT, DevOps, and development teams for timely remediation.

Develop policies and remediation plans, including golden image review processes.

Support incident response for vulnerability exploits.

Assess risks and recommend mitigation strategies.

Reporting & Communication

Create executive dashboards on vulnerability and golden image security status.

Communicate findings to technical teams and leadership.

Maintain accurate vulnerability, asset, and golden image inventories.

Change Management
Continuous Improvement

Stay updated on emerging threats, vulnerabilities, and golden image security best practices.

Recommend tools for vulnerability, container, and golden image security management.

Support penetration testing, audits, and security training.

Required Qualifications
Technical Skills

2+ years in vulnerability management, cybersecurity or related experience.

Deep, hands‑on expertise with leading vulnerability scanning platforms (Tenable, Qualys, etc.).

Assessment of golden image reviews for Windows, Linux, Unix, and Containers.

Familiarity with network protocols, operating systems, and cloud platforms (AWS, Azure, GCP).

Experience with patch and configuration management tools (e.g., Tanium, Intune, SSM, JAMF).

Expert understanding of the vulnerability lifecycle, risk assessment, and advanced prioritization techniques (CVSS, EPSS, CWE, CISA KEV).

Understanding of frameworks like NIST, OWASP.

Familiarity with compliance standards (e.g., PCI DSS, SOX).

Knowledge of threat modeling and penetration testing; familiar with scripting languages.

General skills

Strong critical thinking and analytical skills.

Ability to approach problem solving in a constructive and collaborative way that does not require absolute security.

  • The ability to communicate complicated technical issues and risks to programmers, network engineers and managers.
  • Strong project and team‑building skills.
  • Exceptional communication skills with diverse audiences; the ability to be an application security subject‑matter expert who can explain relevant topics to general audiences.
EDUCATIONAL REQUIREMENTS:

Bachelor’s degree in computer science, Information Systems, or equivalent combination of education and experience.

Certifications in the field of Information Security (at least one of the following: CEH, GIAC CPEN, OSCP, OSWE, CWAPT, GWAPT, GWEB).

EXPERIENCE REQUIRED:

A minimum of 2 years of experience.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.