Security Operations Specialist Vulnerability Management
At Iron Mountain we know that work, when done well, makes a positive impact for our customers, our employees, and our planet. Thats why we need smart, committed people to join us. Whether youre looking to start your career or make a change, talk to us and see how you can elevate the power of your work at Iron Mountain.We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our 225,000 customers around the world to preserve their invaluable artifacts, extract more from their inventory, and protect their data privacy in innovative and socially responsible ways.Are you curious about being part of our growth stor y while evolving your skills in a culture that will welcome your unique contributions If so, let's start the conversation.Security Operations Specialist Vulnerability Management Location: Remote (India) Job Type: Full-Time Department: Information Security / Security Operations Job SummaryWe are seeking a Security Operations Specialist to manage and oversee the vulnerability management lifecycle , ensuring the security of cloud, application, and endpoint environments. This role involves daily operations of Tenable, Prisma Cloud, Twistlock, AppOmni (SaaS Security Posture Management), and GitLab , focusing on identifying, prioritizing, and remediating critical, high, and medium vulnerabilities . The ideal candidate will collaborate with IT teams to drive remediation efforts and provide actionable security insights to executive leadership .Key Responsibilities 1. Vulnerability Management & Monitoring Manage the configuration, operation, and optimization of vulnerability management tools ( Tenable, Prisma Cloud, Twistlock, AppOmni, GitLab ). Continuously scan, assess, and track vulnerabilities across cloud, application, and infrastructure environments. Prioritize critical, high, and medium vulnerabilities based on business risk. Remediation & Collaboration with IT Work closely with IT and DevOps teams to remediate vulnerabilities efficiently. Provide clear remediation steps and verify fixes after patching. Ensure compliance with security policies and industry best practices . Security Analysis & Reporting Analyze vulnerability trends and risk exposure to proactively mitigate threats . Develop dashboards, reports, and insights to communicate security risks to executives. Track and report on remediation progress and security posture improvements . Continuous Improvement & Process Automation Automate security workflows for vulnerability detection, triage, and reporting . Enhance vulnerability management processes and integrate security tools with SIEM and ITSM platforms. Stay updated on emerging threats, zero-day vulnerabilities, and evolving security technologies .Qualifications & Skills Required: 3+ years of experience in vulnerability management or security operations . Hands-on experience with Tenable, Prisma Cloud, Twistlock, AppOmni, GitLab . Strong understanding of cloud security (AWS, Azure, GCP), container security, and application vulnerabilities . Ability to analyze and prioritize vulnerabilities based on risk impact. Experience working with IT teams for remediation and patch management. Strong analytical and reporting skills to provide executive-level insights .Preferred: Certifications like CISSP, CEH, OSCP, or AWS Security Specialty . Experience integrating vulnerability management tools with SIEM/ITSM platforms. Familiarity with security frameworks (NIST, ISO 27001, CIS Controls) .Category: Information TechnologyIron Mountain is a global leader in storage and information management services trusted by more than 225,000 organizations in 60 countries. We safeguard billions of our customers assets, including critical business information, highly sensitive data, and invaluable cultural and historic artifacts. Take a look at our history here.Iron Mountain helps lower cost and risk, comply with regulations, recover from disaster, and enable digital and sustainable solutions, whether in information management, digital transformation, secure storage and destruction, data center operations, cloud services, or art storage and logistics. Please see our Values and Code of Ethics for a look at our principles and aspirations in elevating the power of our work together.If you have a physical or mental disability that requires special accommodations, please let us know by sending an email to hidden_email the Supplement to learn more about Equal Employment Opportunity.Requisition: Jhidden_mobile,
Sign-in & see how your skills match this job
- Security Operations Specialist Vulnerability Management
Find Your perfect Job
Sign-in & Get noticed by top recruiters and get hired fast
automation, APIs, communication, collaboration, AWS, CISSP, CEH,remediation activities, integrating security tools, vulnerability assessment tools, security frameworks, cloud security best practices, CompTIA Security
Information Security, Computer Science, Cloud Security, Security Operations, AWS, Azure, GCP, IAM, Network Security, Analytical Skills, Communication Skills,Wiz, Incident Response, DevSecOps, Identity Tools, Cybersecurity, Threat Detection, WQL Queries, Microsoft Sentinel, Defender for Cloud, MITRE ATTCK Framework
Agile Methodologies, Web Application Security, Network Security, Computer Security, Cloud Security, Programming, Security Monitoring,Incident Response
automation, APIs, communication, collaboration, AWS, CISSP, CEH,remediation activities, integrating security tools, vulnerability assessment tools, security frameworks, cloud security best practices, CompTIA Security
Information Security, Computer Science, Cloud Security, Security Operations, AWS, Azure, GCP, IAM, Network Security, Analytical Skills, Communication Skills,Wiz, Incident Response, DevSecOps, Identity Tools, Cybersecurity, Threat Detection, WQL Queries, Microsoft Sentinel, Defender for Cloud, MITRE ATTCK Framework
Agile Methodologies, Web Application Security, Network Security, Computer Security, Cloud Security, Programming, Security Monitoring,Incident Response