Title: Vulnerability Management
Job Description
Key Responsibilities:
• Lead and execute vulnerability assessments across enterprise systems using Qualys VMDR and related modules.
• Manage and optimize Qualys scanning infrastructure including scanner appliances and cloud agents.
• Develop and maintain scanning strategies and schedules for internal and external assets.
• Analyze scan results, prioritize vulnerabilities based on risk, and coordinate remediation efforts with stakeholders.
• Generate detailed reports and dashboards using Qualys reporting tools and best practices.
• Ensure compliance with internal security policies and external regulatory requirements.
• Provide technical guidance and mentorship to junior team members.
• Collaborate with IT, DevOps, and application teams to integrate vulnerability management into CI/CD pipelines.
Required Skills and Experience:
• 5+ years of experience in vulnerability assessment and management.
• Hands-on experience with Qualys VMDR, Patch Management, and Continuous Monitoring.
• Strong understanding of vulnerability lifecycle, CVSS scoring, and remediation workflows.
• Experience with asset discovery, host tracking, and scanning best practices.
• Familiarity with scripting (Python, PowerShell) for automation and integration.
• Knowledge of network protocols, operating systems, and web application security.
• Industry certifications such as CEH, CISSP, or Qualys certifications are a plus.
͏
Do
-
Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
-
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
No. |
Performance Parameter |
Measure |
1. |
Customer centricity |
Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
2. |
Process Adherence |
Adherence to SLA’s (90-95%), response time and resolution time TAT |
͏
͏
Experience: 3-5 Years .
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.