Security Specialist - Vulnerability Management

Role Security Specialist - Vulnerability Management Primary Responsibilities Vulnerability Management Program Oversight Oversee and support the continuous improvement of the vulnerability management program initiatives, process and technology integration, and technical assessment. Enhance technology and/or process to validate inventory of critical infrastructure and applications are in place. Identify roadmap, budget, and priorities relative to infrastructure and application security

Thakral One Pte Ltd - Hong Kong - Full time

Salary: Competitive

Role

Security Specialist - Vulnerability Management

Primary Responsibilities
  • Vulnerability Management Program Oversight
    • Oversee and support the continuous improvement of the vulnerability management program initiatives, process and technology integration, and technical assessment.
    • Enhance technology and/or process to validate inventory of critical infrastructure and applications are in place.
    • Identify roadmap, budget, and priorities relative to infrastructure and application security assessments.
  • Vulnerability Assessment and Remediation
    • Direct and/or perform on-going vulnerability assessments, penetration tests, and application and network security scans. Direct assessment efforts in a prioritized fashion, seeking breadth and depth of coverage where appropriate.
    • Create reports and present to executive management with factual documentation of issues identified and clear recommendation for mitigation of found vulnerabilities.
  • Information Security Risk Management
    • Assess, document, and validate the vulnerability management practices across business to ensure compliance against company policy and standards are met.
    • Partner with teams who implement technology and achieve methods for aligning to their processes and reduce vulnerabilities.
    • Assess possible risks to proposed changes to the SPE environment, and if needed recommend alternative solution, or mitigating security controls.
    • Support technical assessments of 3rd party vendors, and vulnerability assessment of subsidiary business through M&A or post-acquisition activity.
21888829
Ad