Cyber Security Expert ASM Lead
Injazat
UAE, Abu Dhabi,Abu Dhabi
منذ 5 يوم
source : Drjobs.ae

Job Role : Cyber Security ExpertASM Lead

Cyber VulnerabilityAssessment and Penetration Testing Domain : (Cyber FusionCenter)

  • Manage the day-to-day needsof the team and operations for vulnerability management and attacksurface reduction
  • Provide threat analysissummations to leadership along with propose actions to minimizethreats
  • Develop close working partnershipswith functional senior leaders to ensure Vulnerability analystshave the support, products, and permissions they need to accomplishtheir mission
  • Provide quality control overteam products; assist with drafting, editing, critiquing, andproofreading vulnerability management playbooks, policies, andreports
  • Maintain an ongoing development ofcurrent threat intelligence and vulnerability analysis with anin-depth knowledge of identification, mitigation, and recoverystrategies
  • Oversee the delivery of effectivevulnerability scanning of infrastructure, code, and applicationswithin both corporate and Cloud environments
  • Guide and direct staff in the successful completion andrecording of scanning activities, as required by audit andregulatory authorities
  • Provide direction andguidance how to manage the consolidation of large sets of dataspecific to vulnerabilities to apply accurate risk weighting andprioritization
  • Requirements :

  • Bachelor's Degree in Computer Engineering,Computer Science or a relevant field.
  • 8-10years' experience in SOC operations and threatmanagement
  • Expertise in cyber threatintelligence & analysis platforms, TI tools, &related technologies
  • Strong leadership& communication skills.
  • Strongexperience using scripting language (Python, Ruby, Shell, Perl;prefer Python
  • Excellent analytical skillsHolds active CISSP certification. Other Information security and / orInformation Technology industry certification (CISA, CISM, GIAC orequivalent) are a plus
  • Experience with leadinga team responsible for performing compliance scans, analysingconfigurations, as well as recommending hardening configurationsettings for networks, operating systems, applications, databases,and other information system components
  • Detailed knowledge of TCP / IP communications, commonprotocols, and applications at the network level
  • Demonstrated analytic expertise - to include ability tothink critically and logically in a dynamic, high-pressure,fast-paced environment
  • Excellent oral andwritten communication skills
  • Experience withPenetration testing and VA tools
  • Experiencewith Microsoft, OS X, and Unix-based operating systems
  • Experience supporting network investigations
  • Experience in scripting with Perl, Shell, Python, orsimilar high-level programming language MBA or graduate degree froman accredited institution
  • Experience leading asecurity team in an enterprise environment
  • Experience working with platform owners to resolvevulnerability and configuration issues Experience managing andtracking vulnerability cases
  • Experience withenterprise full packet capture solutions Network or EngineeringCertification, including Network+, MCSE, or CCNA
  • Preferred certifications include, Security+, CEH, GCIA,GCIH, CISSP or similar certification
  • Performscans to identify vulnerabilities or confirm compliance to securitystandards
  • Maintain patch and vulnerabilitymanagement practices to protect against the exploitation ofcritical vulnerabilities
  • Apply knowledge ofoperating systems, applications, and database vulnerabilityassessments (to include system configuration checks) on variousInformation Systems
  • Interpret vulnerabilityassessment results and report findings to senior VM staff as wellas recommendations for remediation
  • Conductresearch on current vulnerabilities and exploits using publiclyavailable, trusted resources and other finished vulnerabilityproducts Implement and utilize a combination of automated tools(e.
  • g., Nessus, Tanium) and manual checks to identify and validatevulnerabilities Identify cybersecurity vulnerabilities throughsocial engineering, penetration testing and vulnerabilityassessments of digital devices, networks, systems, andapplications

  • Evaluate cybersecurityvulnerabilities in applications, network devices, andinfrastructure software
  • Evaluate cybersecurityvulnerabilities in physical devices, and mobile devices analysis tohighlight compromise
  • بلغ عن هذه الوظيفة
    checkmark

    Thank you for reporting this job!

    Your feedback will help us improve the quality of our services.

    قدِّم طلب ترشيحك
    بريدي الالكتروني
    بالضغط على "واصل" ، أعطي موافقة neuvoo على معالجة بياناتي وإرسال تنبيهات إلي بالبريد الإلكتروني ، على النحو المفصل في سياسة خصوصية لـneuvoo . يجوز لي سحب موافقتي أو إلغاء الاشتراك في أي وقت.
    واصل
    استمارة الطلب