Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Role: Vulnerability Management Engineer
Overview
The Vulnerability Management Engineer will oversee the full lifecycle of vulnerabilities—detecting, analyzing, prioritizing, and driving remediation across the organization’s applications and infrastructure. This role requires strong technical knowledge of CI/CD pipelines, SSDLC practices, modern scanning technologies, and hands-on automation capabilities to enhance efficiency and coverage.
Key Responsibilities
- Vulnerability Lifecycle Ownership: Lead the end-to-end process from identification and triage to remediation tracking and final reporting, ensuring timely and effective resolution.
- Tool Integration & Operationalization: Embed and maintain vulnerability scanning capabilities within CI/CD and SSDLC workflows, including solutions for SAST, DAST, secret scanning, and container scanning.
- Automation Development: Build and maintain automation scripts—preferably in Python—to optimize scanning processes, data collection, analysis, and reporting dashboards.
- Root Cause & Risk Analysis: Evaluate vulnerabilities to determine underlying causes and recommend practical, long-term security controls.
- Threat Modeling: Conduct threat modeling sessions using system architecture diagrams and design documents to identify potential attack paths and security gaps.
- Cross-Team Collaboration: Work closely with engineering, infrastructure, DevOps, and risk teams to support remediation planning and reduce risk exposure.
- Clear Stakeholder Communication: Translate technical vulnerability details into clear, actionable insights for both technical and non-technical stakeholders, including explanations of business impact and mitigation strategies.
- Process Improvement: Continuously refine vulnerability management processes, metrics, and tools to strengthen overall security posture and operational efficiency.
Requirements
- Education: Degree in Computer Science, Information Security, or a relevant field.
- Experience: Min 4-5 years of hands-on vulnerability management experience within CI/CD or SSDLC environments.
- Technical Skills:
- Proficiency with vulnerability scanning tools such as OSS, SAST, and Container Scanning tools.
- Strong scripting and automation capability, especially using Python.
- Solid understanding of secure coding standards and common vulnerabilities, including the OWASP Top 10.
- Experience performing root cause analysis and developing realistic remediation strategies.
- Threat Modeling: Familiarity with established threat modeling techniques and tools.
- Soft Skills:
- Strong communication skills with the ability to present findings clearly to diverse stakeholders.
- Effective stakeholder management and the ability to influence remediation decisions.
Advantageous:
- Offensive security certifications such as OSCP, CEH, or GPEN.
- Experience managing vulnerabilities in large, complex enterprise environments.
- Knowledge of cloud-native security and securing containerized applications.
Key Skills
Ranked by relevanceReady to apply?
Join Astek and take your career to the next level!
Application takes less than 5 minutes

