CrawlJobs Logo

Senior Cyber Security Specialist - Vulnerability Management

vodafone.com Logo

Vodafone

Location Icon

Location:
India , Bangalore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a seasoned cyber security professional to lead the Vulnerability Management domain within our Cyber Defence team. This role is pivotal in enhancing Vodafone’s security posture across global and local entities, proactively identifying and mitigating vulnerabilities, and driving strategic initiatives to reduce cyber risk. The individual will lead a team of experts, manage cross-functional projects, and act as a subject matter expert in security scanning and penetration testing.

Job Responsibility:

  • Lead the Vulnerability Management and Responsible Disclosure team to strengthen Vodafone’s cyber defence capabilities
  • Drive vulnerability management initiatives, ensuring timely identification, communication, and remediation of threats
  • Oversee penetration testing activities related to responsible disclosures and support incident response during crises
  • Research emerging threats, including zero-day vulnerabilities, and ensure targeted scans and mitigation actions
  • Champion continuous improvement through automation and cross-functional collaboration
  • Act as a technical expert in security scanning and penetration testing
  • Foster team development through individual growth plans and maintain high engagement levels
  • Contribute to administrative and delivery initiatives across domains

Requirements:

  • Possess over 10 years of IT experience with a strong focus on cyber security, vulnerability management, and remediation
  • Proficient in tools such as QualysGuard VMDR, WAS, and cloud scanning solutions
  • Skilled in web application penetration testing and knowledgeable in OWASP, Kali Linux, Burp Suite, CVE, SSL PKI, IAM, SIEM, and perimeter security
  • Experienced in managing large-scale vulnerability scanning operations and reporting
  • Strong stakeholder management and communication skills
  • Solid understanding of networking and cyber security policies, standards, and procedures

Nice to have:

Advantageous if experienced in SOC, Endpoint Security, IAM, Information Protection, or the telecom industry

What we offer:
  • Opportunity to lead a high-impact domain within a global cyber security function
  • Exposure to cutting-edge vulnerability management tools and practices
  • Collaboration with international teams and stakeholders across Vodafone markets
  • A chance to influence Vodafone’s cyber risk strategy and operational resilience
  • A dynamic and inclusive work environment that values innovation and continuous improvement

Additional Information:

Job Posted:
January 21, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:
PREMIUM
More languages and countries
+ Unlock 31694 hidden job offers
Languages
English Čeština Deutsch Ελληνικά Español Français +15
Countries
United States United Kingdom India Canada Australia +
See plans
Plans from $2.99 / month

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Cyber Security Specialist - Vulnerability Management

Head of cyber threat exposure and attack surface management

Lead the enterprise-wide Continuous Threat Exposure Management (CTEM) strategy, ...
Location
Location
United Kingdom , Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in cybersecurity with direct exposure to vulnerability management, red teaming, or threat exposure reduction
  • Proven track record leading programs integrating CSPM, SSPM, ASM, BAS, or exposure correlation technologies
  • Strong understanding of attack paths, adversary emulation, and continuous validation concepts
Job Responsibility
Job Responsibility
  • Own and drive the global CTEM strategy, establishing a continuous, threat-driven exposure management lifecycle aligned with NIST, MITRE, and CISA Secure-by-Design principles
  • Lead and develop a high-performing CTEM team, fostering collaboration, technical excellence, and an outcome-driven culture
  • Integrate and oversee key exposure management technologies, including Cloud Security Posture Management (CSPM), SaaS Security Posture Management (SSPM), Attack Surface Management (ASM), Breach & Attack Simulation (BAS), and other exposure correlation platforms
  • Correlate assets, identity, vulnerability, and configuration to identify high-impact, exploitable attack paths and inform prioritized remediation strategies
  • Collaborate with Application Security, Vulnerability Management, Red Team, and Security Operations to synchronize discovery, validation, and remediation of exposures across the enterprise
  • Align CTEM outputs with real-world adversary behaviors, leveraging Red Team and Threat Intelligence input to validate attack paths and focus on exploitable conditions
  • Drive automation and AI-enabled analytics to continuously map, assess, and measure reductions in the organization’s attack surface
  • Translate technical findings into business risk language, enabling senior leadership and risk committees to make data-driven investment decisions
  • Define and lead CTEM governance and operating models, ensuring exposure assessments, validation, and remediation tracking are embedded in operational processes
  • Establish clear KRIs and maturity metrics that demonstrate continuous improvement in visibility, validation, and response effectiveness
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right

External Security Certifications Analyst

We are seeking an experienced ISO27001 auditor to join our globally expanding Ex...
Location
Location
United Kingdom , Northampton; Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • ISMS ISO27001 Internal Auditor – Ability to plan, deliver and report on an Information Security Management System internal continual assessment of a site location, function or process
  • Understanding of technical requirements and passing criteria as laid down by the UK National Cyber Security Centre for Cyber Essentials Plus
  • Understanding of technical requirements and passing criteria for BSI Kitemark certifications
Job Responsibility
Job Responsibility
  • Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threat intelligence concerning exploitation, the reachability of the host (or asset) and the value of the service(s) running on the impacted host
  • Development of vulnerability management operating model, policies and procedures to ensure consistency in vulnerability identification, remediation and reporting. Element owner of the Vulnerability Management Standard including Issues Management and Regulatory alignment
  • Communication of vulnerabilities to relevant parties including senior stakeholders, vendors, external security partners and affect business units using reports and dashboards and provide recommendations for improvement in vulnerability management practices
  • Collaboration with Threat intelligence and Cyber Operations teams to assess and contextualise exposure to latest threat trends and exploits and set appropriate remediation timescales
  • Definition of requirements and acceptance criteria for the implementation and maintenance of automation tools to streamline vulnerability management processes within operating systems and applications
  • Reporting of remediation status of Security Assurance Specialist team findings against Key Risk Indicators
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right
New

Cyber Risk and Compliance Specialist

Are you a risk professional with a knack for bridging the gap between technical ...
Location
Location
United Kingdom , London
Salary
Salary:
500.00 - 520.00 GBP / Day
https://www.randstad.com Logo
Randstad
Expiration Date
June 09, 2026
Flip Icon
Requirements
Requirements
  • A strong understanding of risk management and compliance frameworks
  • Proven experience in control assurance, monitoring, or audit support
  • Direct knowledge of cyber security risk and vulnerability management practices
  • The ability to prioritize risk within complex environments
Job Responsibility
Job Responsibility
  • Support the design and delivery of compliance activities, ensuring that regulatory, operational, and cyber risks are mitigated effectively
  • Act as a key advisor, translating complex technical or regulatory issues into clear business impacts
  • Identify, track, and prioritize risks in line with enterprise frameworks
  • Lead the identification and remediation of cyber security vulnerabilities within agreed timelines
  • Design and execute second-line monitoring to test control effectiveness and identify gaps
  • Drive the closure of control weaknesses and security gaps by ensuring clear ownership and accountability
  • Produce accurate reporting on risk exposure and remediation progress for senior stakeholders
Read More
Arrow Right

Security Senior Manager

The Security Senior Manager role at NTT DATA involves overseeing the detection a...
Location
Location
Mexico , Mexico
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Advanced experience in a Technology Information Security Industry
  • Advanced experience or knowledge of SIEM and IPS technologies
  • Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors
  • Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred
  • SANS GIAC Security Essentials (GSEC) or equivalent preferred
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
Job Responsibility
Job Responsibility
  • Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated
  • Performs access management activities according to the policy
  • Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses
  • Interacts with a global team of Cyber Security Analysts and specialists
  • Manages 2nd level triaging of security alerts, events, and notifications
  • Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees
  • Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders
  • Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified
  • Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults
  • Maintains an understanding of current and emerging threats, vulnerabilities, and trends
Read More
Arrow Right

Vulnerability Management SME

Embark on a transformative journey as a Vulnerability Management SME – VP. At Ba...
Location
Location
United States , Whippany
Salary
Salary:
175000.00 - 225000.00 USD / Year
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proficiency with tools such as Nessus, Qualys, Rapid7, or OpenVAS for identifying and analyzing vulnerabilities
  • Understanding of patch deployment strategies, scheduling, and verification across various operating systems and applications
  • Knowledge of network architecture, firewalls, intrusion detection/prevention systems, and secure network protocols
  • Familiarity with Windows, Linux, and macOS platforms, including their respective security features and vulnerabilities
  • Experience with manual and automated penetration testing techniques to validate vulnerabilities
  • Ability to interpret threat feeds, CVEs, and emerging security trends relevant to vulnerability management
  • Understanding of relevant standards and frameworks such as NIST, ISO 27001, CIS Controls, and how they relate to vulnerability management
Job Responsibility
Job Responsibility
  • Allocation of the correct risk rating and remediation prioritisation to a vulnerability based on industry standards for assessment, available threat intelligence concerning exploitation, the reachability of the host (or asset) and the value of the service(s) running on the impacted host
  • Development of vulnerability management operating model, policies and procedures to ensure consistency in vulnerability identification, remediation and reporting
  • Communication of vulnerabilities to relevant parties including senior stakeholders, vendors, external security partners and affect business units using reports and dashboards and provide recommendations for improvement in vulnerability management practices
  • Collaboration with Threat intelligence and Cyber Operations teams to assess and contextualise exposure to latest threat trends and exploits and set appropriate remediation timescales
  • Definition of requirements and acceptance criteria for the implementation and maintenance of automation tools to streamline vulnerability management processes within operating systems and applications
  • Reporting of remediation status of Security Assurance Specialist team findings against Key Risk Indicators
What we offer
What we offer
  • medical, dental and vision coverage
  • 401(k)
  • life insurance
  • paid leave for qualifying circumstances
  • incentive award eligibility
  • competitive holiday allowance
  • private medical care
  • pension contribution
  • Fulltime
Read More
Arrow Right

Senior Specialist Operational Technology Security

SIG is a leading provider of packaging systems and solutions. We work in partner...
Location
Location
Salary
Salary:
Not provided
sig.biz Logo
SIG Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Cybersecurity, Electrical/Mechanical Engineering, or related field
  • 3+ years of combined OT engineering and cybersecurity experience, including work in Aseptic & Chilled or BiB environments
  • Hands-on expertise with SCADA, PLC, DCS platforms and industrial protocols (Modbus, DNP3, OPC, Ethernet/IP)
  • Proven ability to implement and manage OT security frameworks (IEC 62443, NIST CSF, ISO 27001)
  • Experience with vulnerability assessment and penetration testing tools for OT (e.g., Nozomi, Claroty, SCADAfence)
  • Strong understanding of network segmentation, firewalls, IDS/IPS in industrial settings
  • Solid grasp of automation, mechanical, and electrical control systems
  • Excellent analytical, problem-solving, and communication skills
Job Responsibility
Job Responsibility
  • Discover and catalog OT assets, build and maintain accurate asset inventories, and develop and maintain full asset lifecycle management
  • Conduct risk management and vulnerability management on OT networks, devices, and processes
  • Collaborate with IT, Production, engineering, QC, and maintenance teams for the vulnerability management implementation
  • Extend IT security processes to OT environments. Develop, document, and enforce Global OT security policies and procedures aligned to IEC 62443, NIST CSF, and ISO 27001
  • Design and implement network segmentation, zone-based firewalls, and secure architectures for OT environments
  • Deploy and manage OT-focused security tools (Cyber Physical System Protection Platform) to detect and mitigate advanced threats
  • Coordinate with the global SOC for security incident and event monitoring and analysis in OT operations, including plan and execute penetration tests and red team exercises in OT landscapes
  • Supplier relationships security management and embedding security requirements into contracts
  • Define and roll out a global Secure Development Lifecycle (SDLC) for OT environment
  • Provide training and awareness sessions on secure OT practices and emergency response protocols
What we offer
What we offer
  • Competitive compensation
  • Opportunity to partially work from home
  • Part of a globally successful international company
  • Real work, real experience, real opportunities to build skills
  • Part of a highly motivated and dynamic team
  • Personal development opportunities
  • Trainings and coaching opportunities from senior team members
Read More
Arrow Right

Senior Information Security Incident Response Lead

The Senior Information Security Incident Response Lead is responsible for managi...
Location
Location
Mexico , Mexico
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred
  • SANS GIAC Security Essentials (GSEC) or equivalent preferred
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
  • Advanced experience in a Technology Information Security Industry
  • Advanced experience or knowledge of SIEM and IPS technologies
  • Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors
  • Advanced understanding of End Point Protection Software
  • Advanced understanding of Enterprise Detection and Response software
  • Advanced knowledge of technological advances within the information security arena
Job Responsibility
Job Responsibility
  • Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated
  • Performs access management activities according to the policy
  • Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses
  • Interacts with a global team of Cyber Security Analysts and specialists
  • Manages 2nd level triaging of security alerts, events, and notifications
  • Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees
  • Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders
  • Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified
  • Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults
  • Maintains an understanding of current and emerging threats, vulnerabilities, and trends
Read More
Arrow Right
New

Artificial Intelligence Security Specialist EMEA

Citi, the leading global bank, has approximately 200 million customer accounts a...
Location
Location
United Kingdom , London; Belfast
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5-7+ years for Assistant Vice President (C12 Mid - Senior Level)
  • 8-10+ years for Vice President (C13 Senior - Lead/Staff Level)
  • 10+ years for Senior Vice President (C14 Lead/Staff - Principal Level)
  • Depth in at least one of AI/ML engineering, offensive security, detection engineering, software engineering, or security research
  • Hands-on LLM API experience (context management, tool use, evaluation, failure modes) for AI/ML Engineering
  • Agentic systems design
  • AI safety at the infrastructure level
  • Vulnerability research, exploit development, or pen testing with real depth for Cyber Security
  • Detection engineering for novel attack patterns
  • Threat modelling (STRIDE, ATT&CK)
Job Responsibility
Job Responsibility
  • Depends on team: Offensive Security & Vulnerability Management — AI-assisted pen testing at a scale previously impossible
  • Automated exploit validation
  • Bridge the gap from 'AI found a vulnerability' to 'the application team has a PR to fix it'
  • AI & Emerging Technology Security — Define how the bank deploys AI safely
  • Security architecture and assurance for new implementations
  • Building the next generation of AI-powered tools for CISO colleagues
  • Test new models at the cutting edge of creation and influence
  • Cyber Security AI Services — Own the AI products CISO depends on in production — security assurance, cyber security operations, governance and controls, vulnerability assessment
  • Keep them reliable, evolve them fast
  • Cyber Security Operations — Detection, triage, and response for a world where adversaries use AI to find and exploit vulnerabilities faster than traditional detection can keep up
What we offer
What we offer
  • Business casual workplace
  • Hybrid working model (up to 2 days working at home per week)
  • Competitive base salary (annually reviewed)
  • 27 days annual leave (plus bank holidays)
  • Discretional annual performance related bonus
  • Private Medical Care & Life Insurance
  • Employee Assistance Program
  • Pension Plan
  • Paid Parental Leave
  • Special discounts for employees, family, and friends
  • Fulltime
Read More
Arrow Right