Infrastructure Vulnerability Consultant (Cloud)

Bengaluru

Blue Yonder

Blue Yonder is the world leader in digital supply chain transformations and omni-channel commerce fulfillment. Our end-to-end, cognitive business platform enables retailers, manufacturers and logistics providers to best fulfill customer demand...

View company page

Overview: 

  • Leading AI-driven Global Supply Chain Solutions Software Product Company and one of Glassdoor’s “Best Places to Work”  
  • Seeking a Sr. Cloud Infrastructure Vulnerability Consultant who would be responsible for Cloud Security Posture Management (CSPM), identifying security vulnerabilities including misconfigurations across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (Saas), and Platform as a Service (PaaS).  
  • This candidate would also be responsible for Cloud Workload Protection (CWP), to provide continuous discovery and monitoring of vulnerabilities in the workloads deployed in the cloud infrastructure.
  • The candidate will be directly responsible for vulnerability management and threat management of the overall infrastructure and information assets.

Scope: 

  • Core responsibilities include assessing and promoting remediation for all the assets in the Infrastructure as a Service (IaaS) and Software as a Service (Saas).
  • The candidate will be a key member of the centralized information security team.

What you’ll do: 

  • Perform vulnerability scans and report findings for On-prem and Cloud networks.
  • Proficiency in automation or scripting.
  • Publish the vulnerability status reports to senior management and track remediation.
  • Define and participate in the implementation of On-prem and Cloud architecture and security controls.
  • Proactive identification of threats and risk remediation.
  • Discover the assets in the cloud infrastructure to identify and continuously monitor for security vulnerabilities and misconfigurations.
  • Discover and continuously monitor for vulnerabilities in cloud workloads including dockers, Kubernetes, and containers.
  • Create golden images for virtual machines, dockers and containers to be spun up for the business.
  • Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
  • Upgrade security systems by monitoring the security environment; identifying security gaps; and evaluating and implementing enhancements.
  • Participate in and assist with the incident response team, as appropriate.
  • Generate metrics for the Management as needed.
  • Prepare system security reports by collecting, analyzing, and summarizing data and trends.

What we are looking for:  

  • 9-12 years of proven experience in Information security or Vulnerability Management and at least 3-5 years of experience in Cloud security; a Master’s degree can be substituted for experience. 
  • Proven experience in automation or scripting.
  • Extensive experience in public cloud infrastructure such as Microsoft, Google, or AWS.
  • Strong expertise in Vulnerability and Threat Management, gathering and condensing threat intelligence into actionable and meaningful communication materials. 
  • Bachelor’s degree in information security or Information Technology or Computer Science or related fields or from STEM
  • Deep and diverse experience architecting and implementing network security designs. Expert in network security, system security and endpoint security. 
  • Through understanding security vulnerabilities and misconfigurations in the cloud infrastructure.
  • Thorough understanding of native cloud solutions like dockers, containers, Kubernetes, VDIs, cloud storage, cloud infrastructure, etc.
  • Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18. 
  • Proven experience in cloud security posture management tools like Microsoft Defender, Wiz, Tenable, Aqua Security, Prisma Cloud, Lacework, Scribe Security, etc.
  • Proven experience with products dealing with vulnerability management services which include Retina, Qualys, Nessus, Nexpose, etc. 
  • Practical experience with the development, implementation, and management of security-related technologies (i.e., SIEM, WAF, AV, Firewalls, Internet-facing services). 
  • Excellent customer service including strong written and oral communication skills. 
  • Knowledge of security network devices (firewalls, switches, SIEM, Antivirus, cryptography, etc.) and other security networking hardware/software tools. 
  • Demonstrated understanding of information security concepts, standards, and practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting. 
  • Certifications such as CCSK, CCSP, GCSA, Microsoft Certified Azure Security Engineer Associate, CISSP or equivalent. 
  • Results-focused and attention to detail. 

Our Values


If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success – and the success of our customers. Does your heart beat like ours? Find out here: Core Values

Diversity, Inclusion, Value & Equality (DIVE) is our strategy for fostering an inclusive environment we can be proud of. Check out Blue Yonder's inaugural Diversity Report which outlines our commitment to change, and our video celebrating the differences in all of us in the words of some of our associates from around the world.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Antivirus Automation AWS Azure CCSP CISSP Cloud Compliance Computer Science Cryptography CSPM Endpoint security Firewalls IaaS Incident response Intrusion prevention ISO 27001 Kubernetes Monitoring Nessus Network security NIST PaaS Qualys SaaS Scripting SIEM STEM Strategy TCP/IP Threat intelligence Vulnerabilities Vulnerability management Vulnerability scans

Region: Asia/Pacific
Country: India
Job stats:  5  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.