About the Role :
This role will be looking for information about various kinds of security vulnerabilities, known or unknown, including zero-day vulnerabilities and enriching the CS security vulnerability detection database. The person will be required to gather the data, analyse the data, identify its criticality, and also automate tasks. He / she will also be responsible for troubleshooting issues with current data and making enhancements.
What You'll Do :
- Collecting, analyzing, interpreting, evaluating, and integrating vulnerability data from multiple sources to update existing product
- Understanding of common compliance / vulnerability classes and exploitation techniques
- Actively investigate the latest in security vulnerabilities / misconfigurations, advisories, incidents, and provide insights (sources like, Microsoft, Oracle, etc)
- Troubleshooting security vulnerability / misconfiguration issues / gaps that arise
- Vulnerability data discovery and validation (Data efficacy & Accuracy)
- Develop, test and modify custom scripts for vulnerability / CIS content
What You'll Need :
6-12 years of relevant experienceProgramming / scripting knowledge for automating day to day tasks – Python / Perl, Golang.Good understanding of vulnerabilities reported by various sources and their types.Platform knowledge (ex : Windows system concepts like registry, files, services, etc)In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP / IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these conceptsResearch mindset, has a hold on where to look for relevant information pertaining to reported vulnerabilities.Ability to work independently and in a team environmentExcellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alikeProvide influential insights across multiple teamsBonus Points :Knowledge of Configuration Assessment and Compliance domainGood understanding of CIS benchmarks and DISA STIGsGood knowledge on regulatory frameworks like CIS PCI, SOX, FISMA, HIPAA, ISO NERC, NIST etc will be an added advantage.Knowledge of Vulnerability / exploit research and creating signatures for the samePlatform knowledge of one or more of non-windows (like Linux Distros, macOS)Prior experience working with Nessus, Qualys, Rapid 7, Tripwire etcKnowledge of NIST and OWASP is big plus