CrawlJobs Logo

Associate Vulnerability Assessment Specialist

nttdata.com Logo

NTT DATA

Location Icon

Location:
India , Hyderabad

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Associate Vulnerability Assessment Specialist is an entry level role, responsible for assisting in identifying, assessing, and mitigating vulnerabilities within the company's systems and infrastructure. This role works closely with more senior team members within the vulnerability management team to conduct assessments, analyze findings, and recommend remediation actions.

Job Responsibility:

  • Conducts vulnerability scans using automated tools and assist in manual assessments to identify vulnerabilities in systems, networks, applications, and infrastructure components
  • Analyzes scan results and determine the severity and potential impact of identified vulnerabilities
  • Assists in evaluating the potential risks associated with identified vulnerabilities
  • Analyzes the context, potential attack vectors, and business impact to prioritize vulnerabilities based on risk severity and exploitability
  • Collaborates with system owners, administrators, and IT teams to provide guidance on vulnerability remediation
  • Recommends mitigation measures, configuration changes, and patches to address identified vulnerabilities
  • Tracks and verifies the closure of remediation actions
  • Assists in preparing vulnerability assessment reports, documenting assessment findings, and recommending risk mitigation strategies
  • Maintains accurate records of vulnerability assessments, tracking progress, and maintaining vulnerability databases
  • Utilizes vulnerability assessment tools and technologies to conduct scans, analyze results, and assist in identifying emerging threats
  • Stays updated with the latest vulnerabilities, exploits, and security trends to enhance assessment methodologies
  • Works closely with cross-functional teams, including IT operations, development teams, and security stakeholders, to communicate vulnerability findings, mitigation strategies, and remediation progress
  • Provides guidance and assistance to ensure a coordinated response to vulnerabilities
  • Participates in security awareness programs and provide training to end-users and stakeholders on vulnerability management best practices, secure coding, and security hygiene to promote a culture of security awareness
  • Contributes to the enhancement of vulnerability assessment processes, methodologies, and tools
  • Identifies areas for improvement and recommend solutions to enhance efficiency and effectiveness in vulnerability management practices
  • Performs any other task as required

Requirements:

  • Bachelor's degree or equivalent in Computer Science, Information Security, or a related field
  • Entry level of relevant experience in information security or related roles, with a focus on conducting vulnerability assessments and driving remediation efforts
  • Entry level of demonstrated experience in conducting advanced vulnerability assessments, including application security assessments, penetration testing, or code review
  • Familiarity with vulnerability assessment methodologies, tools, and industry best practices
  • Basic understanding of networking concepts, operating systems, and common software vulnerabilities
  • Knowledge of vulnerability scanning tools such as Nessus, OpenVAS, Qualys, or similar tools
  • Understanding of risk analysis principles and the ability to assess the business impact of vulnerabilities
  • Familiarity with vulnerability management frameworks, such as CVE, CVSS, and common vulnerability databases
  • Good analytical and problem-solving skills to analyze scan results, prioritize vulnerabilities, and recommend remediation actions
  • Good communication skills, both written and verbal, to effectively communicate technical concepts to non-technical stakeholders
  • Ability to collaborate and work effectively in cross-functional teams
  • Familiarity with security frameworks and standards, such as NIST, ISO 27001, or CIS Controls, is advantageous

Nice to have:

Relevant certifications, such as Certified Ethical Hacker (CEH), CompTIA Security+, or GIAC Certified Penetration Tester (GPEN), are beneficial but not required

Additional Information:

Job Posted:
March 25, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Associate Vulnerability Assessment Specialist

Vulnerability Assessment Specialist

The Vulnerability Assessment Specialist is a seasoned subject matter expert, res...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree or equivalent in Computer Science, Information Security, or a related field
  • Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), or GIAC Certified Vulnerability Assessor (GCVA) are beneficial
  • Seasoned demonstrated experience in information security or related roles, with a focus on conducting vulnerability assessments and providing remediation recommendations
  • Seasoned demonstrated experience in conducting advanced vulnerability assessments, including application security assessments, penetration testing, or code review
  • Seasoned understanding of vulnerability assessment methodologies, tools, and industry best practices
  • Seasoned understanding of networking concepts, operating systems, and common software vulnerabilities
  • Solid proficiency in using vulnerability assessment tools such as Nessus, OpenVAS, Qualys, or similar tools
  • Seasoned knowledge of risk analysis principles and the ability to assess the business impact of vulnerabilities
  • Solid knowledge of vulnerability management frameworks, such as CVE, CVSS, and common vulnerability databases
  • Strong analytical and problem-solving skills to analyze scan results, prioritize vulnerabilities, and recommend effective remediation actions
Job Responsibility
Job Responsibility
  • Conducts vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components
  • Analyzes scan results and prioritizes vulnerabilities based on severity, impact, and exploitability
  • Assesses the potential risks associated with identified vulnerabilities
  • Analyzes the business impact, likelihood of exploitation, and potential attack vectors to prioritize remediation efforts based on risk severity
  • Provides detailed remediation recommendations to system owners, administrators, and IT teams
  • Collaborates to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities
  • Utilizes vulnerability scanning tools such as Nessus, OpenVAS, Qualys, or similar tools to conduct scans, configure scan policies, and fine-tune scan parameters for accurate and comprehensive assessments
  • Prepares vulnerability assessment reports, documenting assessment findings, risk analysis, and recommended actions
  • Communicates assessment results to stakeholders, including technical and non-technical audiences, in a clear and concise manner
  • Collaborates with cross-functional teams, including IT operations, development teams, and security stakeholders, to ensure effective communication, coordination, and alignment on vulnerability management efforts
What we offer
What we offer
  • Workplace embraces diversity and inclusion
  • Place where you can grow, belong and thrive
  • Fulltime
Read More
Arrow Right

Care Coordinator Registered Nurse

As an advocate for the patient, the RN care manager will assess, plan, implement...
Location
Location
United States , Flint
Salary
Salary:
Not provided
intelycare.com Logo
IntelyCare
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • RN with a valid unrestricted Michigan license
  • Three (3) years clinical nursing experience serving chronically ill patients and extensive knowledge of issues associated with chronic care and geriatrics
Job Responsibility
Job Responsibility
  • Provides telephonic and face-to-face comprehensive assessment and care management services to patients as part of an interdisciplinary team
  • Uses multi-dimensional assessment skills, risk assessment and screening tools to target high risk and vulnerable populations
  • Assesses over time the health care, educational, and psychosocial needs of the patient/caregiver
  • Uses standardized assessment tools such as depression screening, functionality, and health risk assessment
  • Provides follow up with patient/family when patient transitions from one setting to another
  • Completes timely post-hospital follow up: Medication reconciliation, PCP or specialist follow-up appointment, assess symptoms, teach warning signs, review discharge instructions, coordination of care, and problem solve barriers
  • Uses clinical judgment to determine level of care and collaborates with the PCP, patient and interdisciplinary team, including continuum of care settings and community
  • Parttime
Read More
Arrow Right

Senior Information Security Specialist

As a Senior Information Security Specialist, you will play a critical role in sa...
Location
Location
United States , Clarksburg
Salary
Salary:
Not provided
imts.us Logo
Innovative Management & Technology Services
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent professional experience)
  • Minimum 7 years of experience in information security, IT risk management, or cybersecurity compliance, preferably in a federal or state agency environment
  • Demonstrated experience applying and interpreting NIST 800-53, OWASP, and DISA STIGs in real-world projects
  • Strong hands-on technical background in networking, system administration, or software development
  • Proficiency with SIEM tools—especially Splunk—for event correlation, alerting, and compliance reporting
  • Familiarity with Agile development environments and DevSecOps principles
  • Strong written and verbal communication skills, with the ability to create reports and briefings for technical and non-technical stakeholders
  • Active Top Secret clearance is required
  • U.S. Citizenship is required
Job Responsibility
Job Responsibility
  • Lead comprehensive reviews of management, operational, personnel, and technical controls throughout the system development lifecycle (SDLC)
  • Identify and assess emerging security risks, weaknesses, and vulnerabilities associated with infrastructure, applications, and operations
  • Collaborate with developers and engineers to ensure identified risks are mitigated and documented effectively
  • Ensure compliance with federal and industry security standards including NIST SP 800-53, OWASP Top 10, Common Criteria, DISA STIGs, and SANS Institute recommendations
  • Support and contribute to Authorization to Operate (ATO) packages, including preparation of SSPs, POA&Ms, and continuous monitoring (ConMon) artifacts
  • Advise on policy alignment and security architecture improvements to support secure Agile delivery
  • Apply technical knowledge of networking, system administration, and development to assess the security posture of enterprise environments
  • Utilize Splunk to perform audit log analysis, generate system alerts, and support threat hunting and incident response activities
  • Recommend and implement automated logging, monitoring, and security reporting processes
  • Engage proactively with Agile development teams, product owners, and ISSOs to embed security into project planning and delivery
What we offer
What we offer
  • competitive compensation
  • excellent benefits including tuition reimbursement and employer-contributed 401K
  • referral bonuses
  • Fulltime
Read More
Arrow Right
New

Occupational Therapist

You will be instrumental in promoting health and independence by delivering high...
Location
Location
United Kingdom , Widnes
Salary
Salary:
42103.00 GBP / Year
elysiumhealthcare.co.uk Logo
Elysium Healthcare
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Occupational Therapy profession qualification
  • Extensive and relevant post qualification clinical experience with adults who have complex needs
  • Extensive experience of applying occupational frames of reference and approaches
  • Demonstrates evidence highly effective clinical reasoning skills
  • Highly specialist knowledge of relevant assessment and treatment models
  • Knowledge of how to work with vulnerable individuals
Job Responsibility
Job Responsibility
  • Communicating effectively with a range of clinicians, managers, directors, associate directors, people who access services, carers/supporter/family members, stakeholders and agencies
  • Providing compassionate and effective leadership to junior staff including support staff and assistants
  • Ensuring the delivery of occupational therapy student placements
  • Supporting the completion of appraisals/personal development plans with junior staff
  • To be responsible for the development and implementation of appropriate policies, protocols and care pathways
What we offer
What we offer
  • The equivalent of 33 days annual leave (including bank holidays) – plus your birthday off and the option to buy additional annual leave
  • Career development and training
  • Access to our Rewards & Benefits platform Ely-Vate
  • Wellbeing support and activities
  • Access to Blue Light Card
  • Life Assurance
  • Stream – instant access to earned wages
  • 24/7 GP service and second medical opinion
  • Enhanced Maternity Package
  • Pension contribution
  • Fulltime
Read More
Arrow Right

Cybersecurity Specialist 3

As part of a multidisciplinary team, you will be responsible for coordinating an...
Location
Location
United States , Louisville, Kentucky
Salary
Salary:
Not provided
mcdean.com Logo
M.C. Dean, Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ Years of Experience with a Master's Degree in Information Technology, Risk Management, Cybersecurity
  • 5+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity
  • 8+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, Cybersecurity
  • 11+ Years with a High School Diploma/ GED
  • Working with industry and government agencies on the design of platforms and integrated systems Working on government and/commercial projects implementing cybersecurity requirements in a variety of industrial control systems (e.g., building management, electronic security, fire alarm/mass notification, electrical distribution, power management, etc.)
  • Proficiency with ACAS and HBSS and mitigation strategies
  • Developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data
  • Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS
  • Establishing, managing, and tracking of Plan of Action & Milestones (POA&M)
  • Applying STIGs to servers, databases, applications, and other hardware Security Readiness Review (SRR) Tools (scripts and ACAS)
Job Responsibility
Job Responsibility
  • Working closely and supporting team members, vendors, and government customers
  • Implementing DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems
  • Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process
  • Conducting ICS/SCADA system inventories following DoD guidance
  • Conducting vulnerability scanning and document system vulnerabilities
  • Supporting ISO standardization and Quality inspections
  • Participating in continuous improvement of organizational cybersecurity posture
  • Fulltime
Read More
Arrow Right

DevOps Coordinator

Unilever has an agreed IT mission to leverage internal & external capabilities t...
Location
Location
Brazil , São Paulo
Salary
Salary:
Not provided
unilever.com Logo
Unilever
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in a DevOps area, working within a fast-paced and fast-evolving environment
  • Proven, and successful experience leading a DevOps team
  • Working in Project management methodologies such as Scrum, DevOps & Agile practices, including continuous integration, continuous delivery, and infrastructure as code as well as security best practices
  • Good managing cross-functional teams related to AM&AD skills
  • Experience with monitoring and logging tools for proactive performance monitoring and issue resolution
  • Familiarity with security practices, including infrastructure hardening, vulnerability scanning, and access controls
  • Excellent communication and stakeholder management abilities
  • Good project management and organizational skills
  • Good knowledge of IT governance frameworks, risk management, and regulatory compliance
  • Excellent analytical and problem-solving skills to troubleshoot environment-related issues
Job Responsibility
Job Responsibility
  • Oversee the development, implementation, and management of our DevOps practices and infrastructure
  • Drive efficiency, scalability, and reliability across our software development, deployment, and operations processes
  • Support Application teams supporting a robust framework & principles bringing velocity, cost avoidance with a real high quality in line with the Business requirements
  • End to End management of the services delivered by the Platform, including incident, problem, release & change, and service delivery processes
  • Support Service Performance Review governance is followed addressing proper action to re-establish the service when required
  • Identify and manage Risks and Issues, proposing action plans
  • Interact and ensure synchronization/alignment with other Platforms
  • Support and deliver all activities related to DevOps sprints (on time, in full and on budget) from beginning to completion within the Platform
  • Support operational upgrades, migrations, or enhancements while minimizing disruption to platform operations
  • Solve problems relating to mission critical services and build automation to prevent problem recurrences
  • Fulltime
Read More
Arrow Right

Cyber Analysis Support Specialist

The Cyber Analysis Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree in liberal arts or sciences or equivalent military training
  • Experience with computer network operations and SIGINT tools and databases
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
  • The ability to work non-standard hours when needed
Job Responsibility
Job Responsibility
  • Conduct research, evaluate technical threat data, and leverage all-source intelligence in a network operations and cyber warfare environment
  • Evaluate cyber threat events to determine their impact on DoD and US Government operations and understand adversary capabilities
  • Leverage multiple analytic tools to conduct research and analyze data
  • Analyze vulnerabilities associated with DoD and US Government networks to determine risk
  • Write collection requirements and tasking for signals intelligence collection systems based on analytic assessments
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Specialist IS Security Engineer – Identity Management

Join our team at AMGEN Capability Center Portugal, the #1 company in Best Workpl...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
amgen.com Logo
Amgen
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s degree and 4 years of Information Systems or Information Security experience
  • Bachelor’s degree and 6 years of Information Systems or Information Security experience
  • Associate’s degree and 8 years of Information Systems or Information Security experience
  • Strong experience with identity and access management (IAM) and identity security solutions
  • Hands-on experience integrating SailPoint with enterprise applications (on-prem and cloud)
  • Solid understanding of identity governance concepts, including RBAC, access certifications, least privilege, and user lifecycle management
  • Proficiency with identity platforms such as SailPoint, Okta, Azure AD / Entra ID
  • Knowledge of authentication and provisioning protocols (SCIM, SAML, OAuth, OpenID Connect)
  • Experience working with APIs and secure integration patterns
  • Strong understanding of directory services (LDAP, Active Directory)
Job Responsibility
Job Responsibility
  • Design, implement, administer, and maintain security controls for Amgen’s identity and access management ecosystem, including provisioning, authentication, and authorization systems
  • Engineer and support secure identity provisioning solutions aligned with IAM and RBAC frameworks across on-premises and cloud environments
  • Serve as a security engineering lead for IdM and access-related initiatives, ensuring solutions meet security architecture standards, governance requirements, and regulatory expectations
  • Conduct security reviews, threat modeling, and risk assessments for identity-related systems and integrations
  • Partner with project and application teams to embed security best practices into system designs, configurations, and deployments
  • Monitor security, operational, and performance metrics for managed systems
  • develop KPIs to track security posture, availability, and growth trends
  • Support incident response activities related to identity, access, and authentication issues, including investigation, containment, remediation, and documentation
  • Develop and maintain security documentation, including system security designs, operational procedures, incident response playbooks, and access control policies
  • Evaluate emerging security tools, technologies, and industry trends to continuously improve identity and access security capabilities
What we offer
What we offer
  • Work That Matters – Build tech that accelerates scientific breakthroughs and helps patients worldwide
  • Modern Tech Stack – Cloud-first, automation-focused, AI-powered
  • Global Scale, Agile Mindset – Collaborate across continents while working in nimble, high-impact teams
  • Continuous Learning – Access to certifications, trainings, mentorship, and career mobility
  • AMGEN Total Rewards Plan – Comprehensive benefits in healthcare, finance, and well-being
  • Flexibility – Hybrid work model with time split between our Lisbon office and remote work
  • Fulltime
Read More
Arrow Right