- Company Name
- Correla
- Job Title
- Vulnerability Management Lead
- Job Description
-
Job title: Vulnerability Management Lead
Role Summary:
Lead the design, operation, and continuous improvement of the vulnerability management program across infrastructure, applications, and cloud environments, ensuring alignment with industry standards and regulatory expectations.
Expectations:
- Own and administer the vulnerability management platform, ensuring comprehensive scan coverage and accurate reporting.
- Maintain and evolve vulnerability management policies, processes, SLAs, and reporting to meet NIST, ISO 27001, CIS Controls, and regulatory requirements.
- Plan, execute, validate, and analyze vulnerability scans, prioritising remediation based on risk impact.
- Deliver regular dashboards and detailed reports to technical teams and leadership, highlighting trends, key risks, and remediation progress.
- Coordinate remediation activities with internal teams and third‑party suppliers, manage timelines, and drive escalation of high‑risk issues.
- Drive automation and integration with ITSM/reporting tools, and support broader security awareness initiatives.
Key Responsibilities:
1. Operate and tune enterprise vulnerability scanning tools across on‑premise, cloud, and application assets.
2. Define, document, and enforce vulnerability management policies, procedures, and SLAs.
3. Conduct vulnerability assessment cycles, validate findings, quantify risk, and produce actionable remediation plans.
4. Develop and maintain dashboards, KPI metrics, and trend analyses for stakeholders.
5. Lead cross‑functional remediation coordination, including vendor and supplier engagement.
6. Implement automation scripts (PowerShell, Python, APIs) to streamline scanning, reporting, and remediation workflows.
7. Evaluate and recommend new tools, techniques, and vendor solutions to improve program effectiveness.
Required Skills:
- Deep knowledge of vulnerability management concepts, scanning methodologies, and remediation processes.
- Proficiency with enterprise vulnerability tools and experience translating scan data into actionable insights.
- Strong understanding of security frameworks: NIST, ISO 27001, CIS Controls.
- Excellent stakeholder management, communication, and business‑technical translation skills.
- Experience working with third‑party suppliers and managed service providers for patching and remediation integration.
- Analytical, organizational, and reporting capabilities with meticulous attention to detail.
- Familiarity with automation and scripting (PowerShell, Python, APIs) for process improvement.
Required Education & Certifications:
- Minimum of Security+ or equivalent security credentials.
- CySA+ and knowledge of CVE/CVSS fundamentals are desirable.
- Relevant industry certifications or equivalent experience.