FANATICS INC
Qualcomm Technologies, Inc
Motive
Thermo Fisher Scientific, Inc
DigitalOcean LLC
HRSI
HRSI
HRSI
Connect with headhunters to apply for similar jobsThermo Fisher Scientific, Inc
HRSI
S&P Global
Healthwire
Huzzle
Qualcomm Technologies, Inc
Prime System Solutions
Translation Empire
X UP Brands
CrewBloom
PMCL-JAZZ
Translation Empire
Remote VA
CrewBloom
Prime System Solutions
A leading technology firm in Pakistan is seeking a Vulnerability Management Specialist to oversee vulnerability programs, conduct IT asset assessments, and collaborate on security policies. The ideal candidate will have over 2 years of experience in cybersecurity, strong analytical skills, and knowledge of vulnerability scanning tools like Tenable and Qualys. This role ensures the integrity of IT assets and supports incident response efforts.
Manage vulnerability programs for IT assets, containers (e.g., Docker, Kubernetes), and base golden images across operating systems (Windows, Linux, Unix).
Conduct regular scans using industry-standard tools.
Analyze and prioritize vulnerabilities based on risk, exploitability, and asset criticality.
Track and report remediation progress.
Collaborate with IT, DevOps, and development teams for timely remediation.
Develop policies and remediation plans, including golden image review processes.
Support incident response for vulnerability exploits.
Assess risks and recommend mitigation strategies.
Create executive dashboards on vulnerability and golden image security status.
Communicate findings to technical teams and leadership.
Maintain accurate vulnerability, asset, and golden image inventories.
Stay updated on emerging threats, vulnerabilities, and golden image security best practices.
Recommend tools for vulnerability, container, and golden image security management.
Support penetration testing, audits, and security training.
2+ years in vulnerability management, cybersecurity or related experience.
Deep, hands‑on expertise with leading vulnerability scanning platforms (Tenable, Qualys, etc.).
Assessment of golden image reviews for Windows, Linux, Unix, and Containers.
Familiarity with network protocols, operating systems, and cloud platforms (AWS, Azure, GCP).
Experience with patch and configuration management tools (e.g., Tanium, Intune, SSM, JAMF).
Expert understanding of the vulnerability lifecycle, risk assessment, and advanced prioritization techniques (CVSS, EPSS, CWE, CISA KEV).
Understanding of frameworks like NIST, OWASP.
Familiarity with compliance standards (e.g., PCI DSS, SOX).
Knowledge of threat modeling and penetration testing; familiar with scripting languages.
Strong critical thinking and analytical skills.
Ability to approach problem solving in a constructive and collaborative way that does not require absolute security.
Bachelor’s degree in computer science, Information Systems, or equivalent combination of education and experience.
Certifications in the field of Information Security (at least one of the following: CEH, GIAC CPEN, OSCP, OSWE, CWAPT, GWAPT, GWEB).
A minimum of 2 years of experience.
* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.