Vulnerability Management Lead – Security Operations
Chennai
WPP IT provides IT services for WPP, the world’s largest communications services group. As a creative transformation company, WPP is helping its clients transform the future through extraordinary work. WPP IT is an integral part of that journey and we are proud to provide technology for some of the world’s most creative brands.
Why we're hiring:
The role of vulnerability management is to triage vulnerabilities by relevance and criticality to the organisation.
The vulnerability management analyst will then identify mitigations for those vulnerabilities and advise on implementing them.
What you'll be doing:
- Lead complex information systems to understand and prioritise actions on Cyber Security risks, audit requirements and data value, and provide specialist or complex guidance to vulnerability management teams and external senior stakeholders.
- Lead the development and implementation of multiple vulnerability assessments and enterprise-wide scanning strategies across multiple complex environments, while leading in prioritising those vulnerabilities through a risk-based approach.
- Lead the triage of vulnerabilities, ensuring mitigation measures are implemented, and oversee the life cycle of vulnerability management for a set of assets, providing tailored specialist or complex advice on ways to improve control mechanisms and mitigate risks.
- Lead senior stakeholder engagement to create strategic plans for managing vulnerabilities and remediation activities.
- Create organisational principles and vision that will provide the basis for triaging vulnerabilities.
- Provide advice to senior leadership on ways to improve control mechanisms, identify, evaluate, and mitigate risks.
- Develop bespoke templates and test scripts to meet uncommon or complex organisational objectives.
- Set the organisation’s vulnerability management strategy including people, process and technology elements.
- Ensure organisation-specific vulnerability management policies, procedures and guidelines are aligned with organisational objectives and risk appetite.
- Set direction and approve investment in strategic tooling and capability to address strategic enterprise-wide risk.
What you'll need:
Skills and Knowledge:
- Hands on experience of :
- Vulnerability management, tools, techniques and methodologies;
- Application and infrastructure penetration testing
- Information risk assessment and risk management
- Threat intelligence and threat assessment
- Cyber Security operations
- Legal and regulatory considerations
- Understanding the importance of strong Security controls and maintaining a positive user experience.
- Understands security concepts to engage with security technologists and communicate in a language that is appropriate to audience.
- Technical and service awareness.
- Retains a holistic view on the end-to-end security service lifecycle, ensures continued quality of service for established security products and services
- Assist on making decisions based upon evidence and data.
Experience:
- Led diverse, high functioning, vulnerability management or security operations teams.
- Experience of working in a global organisation.
- Collaborative working with suppliers, partners and end-users at all levels.
- Managing staff effectively in order to provide excellent service.
Person:
- Experience in moving a dynamic environment to a business-as-usual one.
- Able to influence and negotiate at broad levels.
- Ability to build and maintain positive business relationships.
- A confident, credible and influential communicator with internal and external stakeholders.
- Able to maintain sight of the mission.
- Ability to identify and escalate critical issues with ease.
- The ability to lead, inspire and influence others.
- Flawless integrity.
Skills and Knowledge:
- Hands on experience of :
- Vulnerability management, tools, techniques and methodologies;
- Application and infrastructure penetration testing
- Information risk assessment and risk management
- Threat intelligence and threat assessment
- Cyber Security operations
- Legal and regulatory considerations
- Understanding the importance of strong Security controls and maintaining a positive user experience.
- Understands security concepts to engage with security technologists and communicate in a language that is appropriate to audience.
- Technical and service awareness.
- Assist on making decisions based upon evidence and data.
Experience:
- Managed the delivery of vulnerability management or security operations objectives.
- Experience of working in a global organisation.
- Collaborative working with suppliers, partners and end-users at all levels.
- Managing staff effectively in order to provide excellent service.
Person:
- Experience in moving a dynamic environment to a business-as-usual one.
- Able to influence and negotiate at broad levels.
- Ability to build and maintain positive business relationships.
- A confident, credible and influential communicator with internal and external stakeholders.
- Able to maintain sight of the mission.
- Ability to identify and escalate critical issues with ease.
- The ability to lead, inspire and influence others.
- Flawless integrity.
Who you are:
You're open: We are inclusive and collaborative; we encourage the free exchange of ideas; we respect and celebrate diverse views. We are open-minded: to new ideas, new partnerships, new ways of working.
You're optimistic: We believe in the power of creativity, technology and talent to create brighter futures or our people, our clients and our communities. We approach all that we do with confidence: to try the new and to seek the unexpected.
You're extraordinary: we are stronger together: through collaboration we achieve the amazing. We are creative leaders and pioneers of our industry; we deliver extraordinary every day.
What we'll give you:
Passionate, driven people - We champion a culture of people that do extraordinary work.
Scale and opportunity - We offer the opportunity to create, influence and deliver projects at a scale that is unparalleled in the industry.
Challenging and stimulating - Unique work and the opportunity to join a group of creative problem solvers. Are you up for the challenge?
Other jobs like this
Explore more Cyber Security career opportunities
Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cybersecurity in general, filtered by job title or popular skill, toolset and products used.
- Open Cyber Security Engineer jobs
- Open Staff Application Security Engineer jobs
- Open Penetration Tester jobs
- Open Senior DevSecOps Engineer jobs
- Open Application Security Engineer/Architect jobs
- Open Senior Security Operations Engineer jobs
- Open Cyber Threat Intelligence Analyst jobs
- Open Staff Security Engineer jobs
- Open Head of Information Security jobs
- Open Lead Security Engineer jobs
- Open SOC Analyst jobs
- Open Cyber Security Analyst jobs
- Open Information System Security Officer (ISSO) jobs
- Open Cybersecurity Engineer jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Sr. Security Engineer jobs
- Open Cloud Security Automation Specialist jobs
- Open Senior Threat Intelligence Analyst jobs
- Open Offensive Security Engineer jobs
- Open Information Security Officer jobs
- Open Cloud Security Operations Lead jobs
- Open Azure Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open DevOps-related jobs
- Open Application security-related jobs
- Open Analytics-related jobs
- Open Audits-related jobs
- Open PCI-related jobs
- Open OWASP-related jobs
- Open Threat intelligence-related jobs
- Open Clearance-related jobs
- Open Security assessments-related jobs
- Open IDS-related jobs
- Open Forensics-related jobs
- Open JavaScript-related jobs
- Open Splunk-related jobs
- Open Ruby-related jobs
- Open CEH-related jobs
- Open Encryption-related jobs
- Open CISM-related jobs
- Open GDPR-related jobs
- Open Agile-related jobs
- Open Open Source-related jobs
- Open Threat detection-related jobs
- Open OSCP-related jobs
- Open Intrusion detection-related jobs
- Open Machine Learning-related jobs
- Open DevSecOps-related jobs