IT Specialist- Vulnerability & Life Cycle Management

Gurgaon/Gurugram, India

Applications have closed

Avery Dennison

Avery Dennison is a global materials science company specializing in the design and manufacture of a wide variety of labeling and functional materials.

View company page

Company Description

Avery Dennison Corporation (NYSE: AVY) is a global materials science and digital identification solutions company that provides a wide range of branding and information solutions that optimize labor and supply chain efficiency, reduce waste, advance sustainability, circularity and transparency, and better connect brands and consumers. Our products and solutions include labeling and functional materials, radio frequency identification (RFID) inlays and tags, software applications that connect the physical and digital, and a variety of products and solutions that enhance branded packaging and carry or display information that improves the customer experience. Serving an array of industries worldwide — including home and personal care, apparel, general retail, e-commerce, logistics, food and grocery, pharmaceuticals and automotive — we employ approximately 35,000 employees in more than 50 countries. Our reported sales in 2023 were $8.4 billion. Learn more at www.averydennison.com.

Job Description

  • Identify, analyze and lead both internal and perimeter attack surface to Avery Dennison’s IT environment
  • Perform review of security findings of on-premise infrastructure and endpoints
  • Prioritize and assign vulnerabilities to appropriate owners for remediation of vulnerabilities
  • Implement remediation SLAs and escalate per Avery Dennison IT security policies and guidelines
  • Coordinate enterprise life cycle management efforts to maintain accurate records of IT assets, including hardware, software, licenses, and end of support dates.
  • Conduct regular review to ensure inventory completeness and compliance with organizational policies.
  • Evaluate and determine upcoming end of support and end life end dates of IT assets, and drive upgrades or replacement effort
  • Generate regular reports and dashboard on the status of IT assets and their life cycle stages.
  • Identify areas for improvement in IT life cycle processes and recommend improvements.

Qualifications

  • Bachelor's degree in information systems, information security, computer science, engineering or similar technical field of study and 2+ years of professional experience in information security, networking and/or systems administration; OR 3+ years of professional experience in information security in lieu of a degree
  • 2+ years of experience implementing, and/or maintaining vulnerability and configuration management technologies in an enterprise level environment
  • Experience with Linux, Windows, and Mac system internals and configuration management tools

Prefered Skills and Experience

  • Independent research and analytical skills on cyber security concepts, knowledge, and specific vendor technologies.
  • Experience and/or knowledge with on-premise vulnerability management, patching and configuration management tools
  • Ability to learn and master cyber security platforms and technologies - through provided resources, documentation and training
  • Strong communication skills with internal customers - both written and verbal
  • Ability to work with vendors to diagnose and troubleshoot problems, and consult on design and configurations
  • Familiarity with security best practices for Windows, Linux, and Mac OS, and secured networking design
  • Experience in analyzing & validating vulnerabilities to most effectively prioritize the most critical vulnerabilities

Additional Information

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, protected veteran status or other protected status. EEOE/M/F/Vet/Disabled. All your information will be kept confidential according to EEO guidelines.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Compliance Computer Science E-commerce Linux SLAs Vulnerabilities Vulnerability management Windows

Region: Asia/Pacific
Country: India
Job stats:  4  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.