- Company Name
- TD
- Job Title
- Information Security Specialist - Vulnerability Management (Infrastructure & Containers)
- Job Description
-
**Job Title**
Information Security Specialist – Vulnerability Management (Infrastructure & Containers)
**Role Summary**
Lead vulnerability management across enterprise infrastructure and container environments. Own end‑to‑end triage, prioritization, and remediation coordination, ensuring alignment with risk appetite and regulatory requirements.
**Expectations**
- Deliver a risk‑based vulnerability lifecycle that reduces mean time to remediate.
- Communicate findings and priorities to technical teams and executive leadership.
- Mentor and grow a cross‑functional vulnerability triage team.
- Champion container security best practices and compliance adherence.
**Key Responsibilities**
- Oversee vulnerability triage: identification, assessment, prioritization, tracking, and classification.
- Develop and maintain triage frameworks integrating CVSS, exploitability, and business impact.
- Analyze scanner, pentest, and threat intelligence reports; assign remediation tasks to appropriate owners.
- Coordinate with system owners, application teams, DevOps, and IT infrastructure to drive timely fixes.
- Apply risk‑based prioritization, set remediation timelines, and monitor compliance milestones.
- Continuously improve workflows, policies, and tooling for vulnerability management.
- Define, track, and report KPIs (MTTR, closure rates) to stakeholders.
- Manage and mentor the vulnerability triage team; provide training and technical guidance.
- Oversight of container scanning, vulnerability prioritization, and remediation in line with architecture and security controls.
- Influence culture of proactive risk management across the organization.
**Required Skills**
*Technical* – Expertise with vulnerability scanners (Qualys, Nessus, Rapid7), CVSS & threat modeling, strong foundation in OS, cloud (AWS, Azure, GCP), networking, application security, container orchestration (Kubernetes, Docker).
*Compliance* – Knowledge of ISO 27001, NIST, PCI‑DSS, and related frameworks.
*Soft* – Analytical problem solving, excellent verbal & written communication, presentation to non‑technical audiences, multi‑tasking under tight deadlines, leadership & mentorship.
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Information Security, or equivalent experience.
- Minimum 5 years in vulnerability management/security operations; 2 + years in a leadership role.
- Certifications highly valued: CISSP, CISM, CEH, GIAC, or equivalent.