Understanding the organizations Cybersecurity strategy and focusing on identifying, managing and mitigating vulnerabilities that could potentially be exploited by the attackers.
- Vulnerability assessment and identification by conducting regular scans using tools like Qualys, Nessus to identify vulnerabilities in the system, applications, and network infrastructure.
- Analyze and prioritize vulnerabilities based on severity, risk and impact, typically using CVSS or other risk assessment frameworks.
- Vulnerability risk management including the risk assessment to analyze the potential impact and likelihood of the vulnerabilities being exploited.
- Prioritize remediation efforts by working with the system owners, IT teams and other based on criticality and business impact.
- Remediation and mitigation planning for ensuring that vulnerabilities are patched or mitigated in a timely manner.
- Develop vulnerability management policies and create remediation guidelines for patch management, risk mitigation, and vulnerability reporting.
- Continuously monitor systems for new vulnerabilities, ensuring the organization stays ahead of emerging threats.
- Provide regular reports to management, detailing vulnerability assessments, risk levels, remediation efforts, and any ongoing challenges.
- Work with incident response team to address vulnerabilities that are actively being exploited or part of ongoing security incidents.
- Integrate threat intelligence feeds and reports into the vulnerability management process to stay ahead of emerging threats.
- Improved client satisfaction by providing thorough and timely project updates and addressing concerns promptly.
- Adapted quickly to changing project priorities and job specifications with analytical thinking and task prioritization skills.
- Mentored junior team members, contributing to their professional growth and development within the company.