Cebu, PH
6 days ago
VULNERABILITY MANAGEMENT ANALYST
Careers About Job Listings Contact VULNERABILITY MANAGEMENT ANALYST

Business Area: Connected Technology

Job Purpose/Mission/Summary

Lexmark is seeking a dedicated and skilled Vulnerability Management Analyst to join our organization’s cybersecurity team. The Vulnerability Management Analyst will play a key role in identifying, assessing, and remediating security vulnerabilities within our technology infrastructure. This position is critical in ensuring the security and integrity of our systems and data. 

Key Roles and Responsibilities: Perform regular compliance and vulnerability scans using industry-standard tools to identify security weaknesses in the organization's systems, networks, and applications. Analyze scan results to prioritize and categorize risks and vulnerabilities based on their severity and potential impact. Collaborate with system owners and support teams to prioritize and facilitate the remediation of identified vulnerabilities, tracking progress and ensuring timely resolution. Assist in the implementation of patch management processes to prioritize vulnerabilities and ensure systems are up to date with security patches. Generate and distribute compliance risks and vulnerability reports to relevant stakeholders, providing clear and actionable recommendations for remediation. Stay informed about emerging security threats, risks and vulnerabilities, as well as industry best practices for vulnerability management. Ensure that systems and applications comply with relevant security standards, regulations, and internal policies. Maintain accurate records of vulnerability assessments, remediation efforts, and security configurations. Work closely with IT and other cross-functional teams, and third-party vendors to improve the organization's security posture. Education, Experience & Certifications Basic Requirements: Bachelor’s degree in business, information technology, Computer Science, Engineering, Cybersecurity, or related field.  5+ years of Information Technology experience  3+ years’ experience in vulnerability management Relevant certifications, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH), are a plus.

You may send your application to recruitment@lexmark.com.

Apply Now *{ margin: 0; padding; 0; } .container-navbar { width: 100%; } .stickynav{ width: 100%; background-color: #333; color: #fff; text-align:center; z-index: 999999; } /*nav style*/ .actual-nav { list-style-type: none; margin: auto; left:0; right:0; width: 1130px; padding: 0; overflow: hidden; background-color: #333; } .actual-nav li { float: left; margin-bottom:0px !important; } .dot { height: 10px; width: 10px; background-color: #fff; border-radius: 50%; display: inline-block; } .actual-nav li a { display: block; color: white; text-align: center; text-decoration: none; padding: 14px 14px 14px 0px; border-bottom: 0px !important; } .bg--white a:visited, .bg--white a:visited i, .bg-white a:visited, .bg-white a:visited i { color: white;} .actual-nav li span { text-align: center; margin: 20px 14px 14px 0px; } .activated { display: block; color: rgb(6, 168, 28) !important; text-align: center; padding: 14px 16px; text-decoration: none; } .actual-nav li a:hover { color: rgb(6, 168, 28); } @media screen and (max-width: 375px) { .dot { height: 7px; width: 7px; background-color: #fff; border-radius: 50%; margin-top:20px; display: inline-block; } .actual-nav li a { display: block; color: white; text-align: center; padding: 14px 11px 14px 5px; text-decoration: none; border-bottom: 0px !important; font-size:14px; } .actual-nav li span { text-align: center; margin: 20px 11px 14px 5px; } }
Confirm your E-mail: Send Email