IT Specialist- Vulnerability & Life Cycle Management
Gurgaon/Gurugram, India
Applications have closed
Avery Dennison
Avery Dennison is a global materials science company specializing in the design and manufacture of a wide variety of labeling and functional materials.Company Description
Avery Dennison Corporation (NYSE: AVY) is a global materials science and digital identification solutions company that provides a wide range of branding and information solutions that optimize labor and supply chain efficiency, reduce waste, advance sustainability, circularity and transparency, and better connect brands and consumers. Our products and solutions include labeling and functional materials, radio frequency identification (RFID) inlays and tags, software applications that connect the physical and digital, and a variety of products and solutions that enhance branded packaging and carry or display information that improves the customer experience. Serving an array of industries worldwide — including home and personal care, apparel, general retail, e-commerce, logistics, food and grocery, pharmaceuticals and automotive — we employ approximately 35,000 employees in more than 50 countries. Our reported sales in 2023 were $8.4 billion. Learn more at www.averydennison.com.
Job Description
- Identify, analyze and lead both internal and perimeter attack surface to Avery Dennison’s IT environment
- Perform review of security findings of on-premise infrastructure and endpoints
- Prioritize and assign vulnerabilities to appropriate owners for remediation of vulnerabilities
- Implement remediation SLAs and escalate per Avery Dennison IT security policies and guidelines
- Coordinate enterprise life cycle management efforts to maintain accurate records of IT assets, including hardware, software, licenses, and end of support dates.
- Conduct regular review to ensure inventory completeness and compliance with organizational policies.
- Evaluate and determine upcoming end of support and end life end dates of IT assets, and drive upgrades or replacement effort
- Generate regular reports and dashboard on the status of IT assets and their life cycle stages.
- Identify areas for improvement in IT life cycle processes and recommend improvements.
Qualifications
- Bachelor's degree in information systems, information security, computer science, engineering or similar technical field of study and 2+ years of professional experience in information security, networking and/or systems administration; OR 3+ years of professional experience in information security in lieu of a degree
- 2+ years of experience implementing, and/or maintaining vulnerability and configuration management technologies in an enterprise level environment
- Experience with Linux, Windows, and Mac system internals and configuration management tools
Prefered Skills and Experience
- Independent research and analytical skills on cyber security concepts, knowledge, and specific vendor technologies.
- Experience and/or knowledge with on-premise vulnerability management, patching and configuration management tools
- Ability to learn and master cyber security platforms and technologies - through provided resources, documentation and training
- Strong communication skills with internal customers - both written and verbal
- Ability to work with vendors to diagnose and troubleshoot problems, and consult on design and configurations
- Familiarity with security best practices for Windows, Linux, and Mac OS, and secured networking design
- Experience in analyzing & validating vulnerabilities to most effectively prioritize the most critical vulnerabilities
Additional Information
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, protected veteran status or other protected status. EEOE/M/F/Vet/Disabled. All your information will be kept confidential according to EEO guidelines.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Compliance Computer Science E-commerce Linux SLAs Vulnerabilities Vulnerability management Windows
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open IT Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Security Operations Analyst jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open IAM-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs