CrawlJobs Logo

Senior Cyber Security Specialist - Vulnerability Management

vodafone.com Logo

Vodafone

Location Icon

Location:
India , Bangalore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a seasoned cyber security professional to lead the Vulnerability Management domain within our Cyber Defence team. This role is pivotal in enhancing Vodafone’s security posture across global and local entities, proactively identifying and mitigating vulnerabilities, and driving strategic initiatives to reduce cyber risk. The individual will lead a team of experts, manage cross-functional projects, and act as a subject matter expert in security scanning and penetration testing.

Job Responsibility:

  • Lead the Vulnerability Management and Responsible Disclosure team to strengthen Vodafone’s cyber defence capabilities
  • Drive vulnerability management initiatives, ensuring timely identification, communication, and remediation of threats
  • Oversee penetration testing activities related to responsible disclosures and support incident response during crises
  • Research emerging threats, including zero-day vulnerabilities, and ensure targeted scans and mitigation actions
  • Champion continuous improvement through automation and cross-functional collaboration
  • Act as a technical expert in security scanning and penetration testing
  • Foster team development through individual growth plans and maintain high engagement levels
  • Contribute to administrative and delivery initiatives across domains

Requirements:

  • Possess over 10 years of IT experience with a strong focus on cyber security, vulnerability management, and remediation
  • Proficient in tools such as QualysGuard VMDR, WAS, and cloud scanning solutions
  • Skilled in web application penetration testing and knowledgeable in OWASP, Kali Linux, Burp Suite, CVE, SSL PKI, IAM, SIEM, and perimeter security
  • Experienced in managing large-scale vulnerability scanning operations and reporting
  • Strong stakeholder management and communication skills
  • Solid understanding of networking and cyber security policies, standards, and procedures

Nice to have:

Advantageous if experienced in SOC, Endpoint Security, IAM, Information Protection, or the telecom industry

What we offer:
  • Opportunity to lead a high-impact domain within a global cyber security function
  • Exposure to cutting-edge vulnerability management tools and practices
  • Collaboration with international teams and stakeholders across Vodafone markets
  • A chance to influence Vodafone’s cyber risk strategy and operational resilience
  • A dynamic and inclusive work environment that values innovation and continuous improvement

Additional Information:

Job Posted:
January 21, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Cyber Security Specialist - Vulnerability Management

Head of cyber threat exposure and attack surface management

Lead the enterprise-wide Continuous Threat Exposure Management (CTEM) strategy, ...
Location
Location
United Kingdom , Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in cybersecurity with direct exposure to vulnerability management, red teaming, or threat exposure reduction
  • Proven track record leading programs integrating CSPM, SSPM, ASM, BAS, or exposure correlation technologies
  • Strong understanding of attack paths, adversary emulation, and continuous validation concepts
Job Responsibility
Job Responsibility
  • Own and drive the global CTEM strategy, establishing a continuous, threat-driven exposure management lifecycle aligned with NIST, MITRE, and CISA Secure-by-Design principles
  • Lead and develop a high-performing CTEM team, fostering collaboration, technical excellence, and an outcome-driven culture
  • Integrate and oversee key exposure management technologies, including Cloud Security Posture Management (CSPM), SaaS Security Posture Management (SSPM), Attack Surface Management (ASM), Breach & Attack Simulation (BAS), and other exposure correlation platforms
  • Correlate assets, identity, vulnerability, and configuration to identify high-impact, exploitable attack paths and inform prioritized remediation strategies
  • Collaborate with Application Security, Vulnerability Management, Red Team, and Security Operations to synchronize discovery, validation, and remediation of exposures across the enterprise
  • Align CTEM outputs with real-world adversary behaviors, leveraging Red Team and Threat Intelligence input to validate attack paths and focus on exploitable conditions
  • Drive automation and AI-enabled analytics to continuously map, assess, and measure reductions in the organization’s attack surface
  • Translate technical findings into business risk language, enabling senior leadership and risk committees to make data-driven investment decisions
  • Define and lead CTEM governance and operating models, ensuring exposure assessments, validation, and remediation tracking are embedded in operational processes
  • Establish clear KRIs and maturity metrics that demonstrate continuous improvement in visibility, validation, and response effectiveness
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right

External Security Certifications Analyst

We are seeking an experienced ISO27001 auditor to join our globally expanding Ex...
Location
Location
United Kingdom , Northampton; Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • ISMS ISO27001 Internal Auditor – Ability to plan, deliver and report on an Information Security Management System internal continual assessment of a site location, function or process
  • Understanding of technical requirements and passing criteria as laid down by the UK National Cyber Security Centre for Cyber Essentials Plus
  • Understanding of technical requirements and passing criteria for BSI Kitemark certifications
Job Responsibility
Job Responsibility
  • Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threat intelligence concerning exploitation, the reachability of the host (or asset) and the value of the service(s) running on the impacted host
  • Development of vulnerability management operating model, policies and procedures to ensure consistency in vulnerability identification, remediation and reporting. Element owner of the Vulnerability Management Standard including Issues Management and Regulatory alignment
  • Communication of vulnerabilities to relevant parties including senior stakeholders, vendors, external security partners and affect business units using reports and dashboards and provide recommendations for improvement in vulnerability management practices
  • Collaboration with Threat intelligence and Cyber Operations teams to assess and contextualise exposure to latest threat trends and exploits and set appropriate remediation timescales
  • Definition of requirements and acceptance criteria for the implementation and maintenance of automation tools to streamline vulnerability management processes within operating systems and applications
  • Reporting of remediation status of Security Assurance Specialist team findings against Key Risk Indicators
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right

Security Senior Manager

The Security Senior Manager role at NTT DATA involves overseeing the detection a...
Location
Location
Mexico , Mexico
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Advanced experience in a Technology Information Security Industry
  • Advanced experience or knowledge of SIEM and IPS technologies
  • Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors
  • Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred
  • SANS GIAC Security Essentials (GSEC) or equivalent preferred
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
Job Responsibility
Job Responsibility
  • Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated
  • Performs access management activities according to the policy
  • Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses
  • Interacts with a global team of Cyber Security Analysts and specialists
  • Manages 2nd level triaging of security alerts, events, and notifications
  • Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees
  • Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders
  • Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified
  • Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults
  • Maintains an understanding of current and emerging threats, vulnerabilities, and trends
Read More
Arrow Right

Vulnerability Management SME

Embark on a transformative journey as a Vulnerability Management SME – VP. At Ba...
Location
Location
United States , Whippany
Salary
Salary:
175000.00 - 225000.00 USD / Year
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proficiency with tools such as Nessus, Qualys, Rapid7, or OpenVAS for identifying and analyzing vulnerabilities
  • Understanding of patch deployment strategies, scheduling, and verification across various operating systems and applications
  • Knowledge of network architecture, firewalls, intrusion detection/prevention systems, and secure network protocols
  • Familiarity with Windows, Linux, and macOS platforms, including their respective security features and vulnerabilities
  • Experience with manual and automated penetration testing techniques to validate vulnerabilities
  • Ability to interpret threat feeds, CVEs, and emerging security trends relevant to vulnerability management
  • Understanding of relevant standards and frameworks such as NIST, ISO 27001, CIS Controls, and how they relate to vulnerability management
Job Responsibility
Job Responsibility
  • Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threat intelligence concerning exploitation, the reachability of the host (or asset) and the value of the service(s) running on the impacted host
  • Development of vulnerability management operating model, policies and procedures to ensure consistency in vulnerability identification, remediation and reporting
  • Communication of vulnerabilities to relevant parties including senior stakeholders, vendors, external security partners and affect business units using reports and dashboards and provide recommendations for improvement in vulnerability management practices
  • Collaboration with Threat intelligence and Cyber Operations teams to assess and contextualise exposure to latest threat trends and exploits and set appropriate remediation timescales
  • Definition of requirements and acceptance criteria for the implementation and maintenance of automation tools to streamline vulnerability management processes within operating systems and applications
  • Reporting of remediation status of Security Assurance Specialist team findings against Key Risk Indicators
What we offer
What we offer
  • medical, dental and vision coverage
  • 401(k)
  • life insurance
  • paid leave for qualifying circumstances
  • incentive award eligibility
  • competitive holiday allowance
  • private medical care
  • pension contribution
  • Fulltime
Read More
Arrow Right

Senior Specialist Operational Technology Security

SIG is a leading provider of packaging systems and solutions. We work in partner...
Location
Location
Salary
Salary:
Not provided
sig.biz Logo
SIG Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Cybersecurity, Electrical/Mechanical Engineering, or related field
  • 3+ years of combined OT engineering and cybersecurity experience, including work in Aseptic & Chilled or BiB environments
  • Hands-on expertise with SCADA, PLC, DCS platforms and industrial protocols (Modbus, DNP3, OPC, Ethernet/IP)
  • Proven ability to implement and manage OT security frameworks (IEC 62443, NIST CSF, ISO 27001)
  • Experience with vulnerability assessment and penetration testing tools for OT (e.g., Nozomi, Claroty, SCADAfence)
  • Strong understanding of network segmentation, firewalls, IDS/IPS in industrial settings
  • Solid grasp of automation, mechanical, and electrical control systems
  • Excellent analytical, problem-solving, and communication skills
Job Responsibility
Job Responsibility
  • Discover and catalog OT assets, build and maintain accurate asset inventories, and develop and maintain full asset lifecycle management
  • Conduct risk management and vulnerability management on OT networks, devices, and processes
  • Collaborate with IT, Production, engineering, QC, and maintenance teams for the vulnerability management implementation
  • Extend IT security processes to OT environments. Develop, document, and enforce Global OT security policies and procedures aligned to IEC 62443, NIST CSF, and ISO 27001
  • Design and implement network segmentation, zone-based firewalls, and secure architectures for OT environments
  • Deploy and manage OT-focused security tools (Cyber Physical System Protection Platform) to detect and mitigate advanced threats
  • Coordinate with the global SOC for security incident and event monitoring and analysis in OT operations, including plan and execute penetration tests and red team exercises in OT landscapes
  • Supplier relationships security management and embedding security requirements into contracts
  • Define and roll out a global Secure Development Lifecycle (SDLC) for OT environment
  • Provide training and awareness sessions on secure OT practices and emergency response protocols
What we offer
What we offer
  • Competitive compensation
  • Opportunity to partially work from home
  • Part of a globally successful international company
  • Real work, real experience, real opportunities to build skills
  • Part of a highly motivated and dynamic team
  • Personal development opportunities
  • Trainings and coaching opportunities from senior team members
Read More
Arrow Right

Senior Information Security Incident Response Lead

The Senior Information Security Incident Response Lead is responsible for managi...
Location
Location
Mexico , Mexico
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred
  • SANS GIAC Security Essentials (GSEC) or equivalent preferred
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
  • Advanced experience in a Technology Information Security Industry
  • Advanced experience or knowledge of SIEM and IPS technologies
  • Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors
  • Advanced understanding of End Point Protection Software
  • Advanced understanding of Enterprise Detection and Response software
  • Advanced knowledge of technological advances within the information security arena
Job Responsibility
Job Responsibility
  • Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated
  • Performs access management activities according to the policy
  • Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses
  • Interacts with a global team of Cyber Security Analysts and specialists
  • Manages 2nd level triaging of security alerts, events, and notifications
  • Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees
  • Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders
  • Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified
  • Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults
  • Maintains an understanding of current and emerging threats, vulnerabilities, and trends
Read More
Arrow Right

Strategic Threat Intelligence Specialist

To reduce Vodafone’s cyber risk exposure by delivering forward-looking, strategi...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of nation-state and financially motivated threat actors targeting telecoms and critical national infrastructure
  • Experience in building or maturing intelligence-sharing processes, including defining requirements, standardising outputs, and measuring impact
  • Ability to combine multiple intelligence sources into clear, defensible strategic assessments
  • Strong stakeholder management skills across technical and executive audiences
  • Experience engaging with external intelligence communities and leveraging trusted relationships to enhance internal security posture
Job Responsibility
Job Responsibility
  • Produce strategic intelligence assessments on priority threat actors, campaigns, and emerging risks impacting telco, network and IT infrastructure
  • Mature and structure Vodafone’s intelligence-sharing relationships across internal stakeholders to ensure intelligence is actionable and consistently drives risk reduction
  • Strengthen and grow external intelligence partnerships with entities such as NCSC, ISACs, peer telcos, and intelligence providers
  • Establish feedback loops to measure whether shared intelligence results in detection improvements, vulnerability remediation, control uplift, or mission activity
  • Translate geopolitical developments, sector targeting trends, and adversary evolution into clear risk implications for Vodafone’s networks, platforms, estate, and supply chain
  • Brief senior leadership and stakeholders with concise, risk-based reporting that supports strategic decision-making
  • Support the development of structured threat missions aligned to priority adversaries, ensuring intelligence requirements are clearly defined and outcomes are tracked
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
Read More
Arrow Right

Senior Specialist, Security Operations and OT Cybersecurity

This position will lead regional security operations and help expand and mature ...
Location
Location
United States , Princeton
Salary
Salary:
120000.00 - 140000.00 USD / Year
rennerbrown.com Logo
Renner Brown
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection
  • Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors
  • Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments
  • Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings
  • Strong analytical and communication skills, with the ability to work effectively across technical and business teams
  • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains
  • Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms
  • Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF
  • Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows
  • Experience collaborating on vulnerability management and remediation across IT and OT environments
Job Responsibility
Job Responsibility
  • Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments
  • Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness
  • Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments
  • Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes
  • Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration
  • Support remediation and post-incident activities to strengthen resilience across technology domains
  • Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices
  • Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards
What we offer
What we offer
  • annual performance bonus and comprehensive benefits package
  • Fulltime
Read More
Arrow Right