Enable job alerts via email!

Vulnerability and Patch Management Specialist

HuntWave Technologies

Johannesburg

On-site

ZAR 300 000 - 600 000

Full time

23 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is looking for a passionate Vulnerability Management Analyst to join their dynamic team. In this role, you will leverage your expertise in information security to identify and mitigate risks across various systems and applications. Your responsibilities will include overseeing security incident responses, conducting vulnerability assessments, and collaborating with technology teams to implement effective security solutions. This is a fantastic opportunity to contribute to a forward-thinking company that values innovation and teamwork, while staying at the forefront of the latest security technologies and best practices.

Qualifications

  • 3+ years of experience in vulnerability management or compliance monitoring.
  • Good knowledge of cloud security platforms and vulnerability scanning tools.

Responsibilities

  • Oversee security incident response and perform system scanning.
  • Communicate risks of vulnerabilities and recommend security controls.

Skills

Vulnerability Management
Cloud Security
Continuous Threat Exposure Management (CTEM)
Cybersecurity
Vulnerability Scanning
Penetration Testing
Information Security Best Practices
Scripting Languages (Perl, Python)

Education

Bachelor's degree in Computer Science
Professional certification (CEH, Security+, CVA, etc.)

Tools

Qualys
Tenable
Nessus
Azure
AWS
Google Cloud

Job description

We are seeking a Vulnerability Management Analyst with experience in enterprise vulnerability assessment and management. This role will utilize expertise with information security to discover, analyze, and characterize risks to Our Clients network, applications, databases, and other components of Our Clients information system. The ideal applicant should be passionate about security, stay up-to-date on the latest technology and industry best practices, and work well in a collaborative team environment.

Typical Duties and Responsibilities:

  • Oversee the coordination of security incident response
  • Perform recurring and on-demand scanning of organization systems and cloud environments
  • Resolve information security incidents, including targeted threats and internal incidents
  • Maintain documentation regarding threat management, including policies and procedures
  • Assist technology teams to develop, implement, and automate security solutions
  • Improve and automate existing vulnerability management systems
  • Monitor intrusion detection systems to identify potential threats
  • Research and assess emerging security threats and vulnerabilities
  • Provide technical support for vulnerability management projects
  • Communicate the risks of identified vulnerabilities and recommend security controls to mitigate them

Required Skills and Experience:

  • 3+ years of experience in vulnerability management or compliance monitoring
  • Proven experience in vulnerability management, cloud security, and Continuous Threat Exposure Management (CTEM)
  • Good knowledge of cloud security platforms (e.g., Azure, AWS, Google Cloud), vulnerability scanning tools (e.g., Qualys, Tenable, Nessus), and an understanding of OWASP standards and application security best practices
  • Experience in a cybersecurity environment
  • Experience in vulnerability scanning, penetration testing, network admission control, and/or SIEM
  • Experience in design and implementation of security technologies
  • Experience with IT controls monitoring for regulatory and compliance requirements
  • Experience with visualization tools
  • In-depth knowledge of information security best practices
  • Knowledge of technical concepts such as cloud computing, automation, networking, and application development
  • Knowledge of vulnerability data management and reporting process automation
  • Knowledge of OWASP tools and methodologies
  • Knowledge of scripting languages such as Perl or Python

Preferred Qualifications:

  • Bachelor's degree in computer science, information security, or a related field
  • Professional certification such as CEH, Security+, CVA, Qualys, Tenable, AZ-500
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.