PIT Solutions

Lead – Vulnerability Database Analyst

Thiruvananthapuram, KL, IN

12 days ago
Save Job

Summary

Job Description

About the Role

We are looking for a cybersecurity-focused, detail-driven Lead Vulnerability Database Analyst to support a global client’s vulnerability intelligence operations. In this role, you will be responsible for maintaining the integrity, accuracy, and relevance of a high-impact vulnerability database. You will collaborate with cybersecurity researchers, vendors, and internal teams to classify, validate, and manage vulnerability data in alignment with industry standards such as CVE and NVD. Your contributions will directly support threat detection, mitigation planning, and responsible vulnerability disclosure on a global scale.

Key Responsibilities

  • Review and validate incoming vulnerability reports for accuracy, completeness, and contextual relevance.
  • Maintain and enhance the vulnerability database by documenting key details, impact assessments, mitigation strategies, and severity levels.
  • Collaborate with global researchers, vendors, and disclosure bodies to ensure ethical and responsible reporting.
  • Analyze vulnerabilities using CVE standards and contribute to classification workflows.
  • Monitor Indicators of Compromise (IOCs), exploit trends, and emerging threat vectors.
  • Leverage automation and scripting (e.g., Python, Bash) for data validation and enrichment tasks.
  • Produce clear and concise documentation, including summary reports and technical bulletins.
  • Ensure compliance with cybersecurity frameworks and responsible handling of sensitive information.

Required Skills & Experience

  • Solid foundation in cybersecurity principles, vulnerability lifecycle management, and threat intelligence.
  • Working knowledge of global vulnerability repositories like the National Vulnerability Database (NVD) and the Common Vulnerabilities and Exposures (CVE) system.
  • Proficiency in scripting languages (Python/Bash) to automate analytical workflows and data integrity checks.
  • Strong analytical mindset with the ability to interpret complex exploit mechanics and risk severity.
  • Effective communicator—able to liaise with both technical and non-technical stakeholders.
  • Experience with structured databases, version control systems, and cybersecurity toolkits.

Preferred Skills & Qualifications

  • 4–5 years of hands-on experience in vulnerability research, security operations, or cyber threat analysis.
  • Professional certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or equivalent.
  • Background in ethical hacking, penetration testing, or security tool development.
  • Familiarity with disclosure norms, vulnerability scoring systems (CVSS), and compliance frameworks (e.g., NIST, ISO/IEC 27001).
  • Experience with automating cybersecurity workflows using open-source or commercial tools.

Requirements

Required Skills & Experience Solid foundation in cybersecurity principles, vulnerability lifecycle management, and threat intelligence. Working knowledge of global vulnerability repositories like the National Vulnerability Database (NVD) and the Common Vulnerabilities and Exposures (CVE) system. Proficiency in scripting languages (Python/Bash) to automate analytical workflows and data integrity checks. Strong analytical mindset with the ability to interpret complex exploit mechanics and risk severity. Effective communicator—able to liaise with both technical and non-technical stakeholders. Experience with structured databases, version control systems, and cybersecurity toolkits. Preferred Skills & Qualifications 4–5 years of hands-on experience in vulnerability research, security operations, or cyber threat analysis. Professional certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or equivalent. Background in ethical hacking, penetration testing, or security tool development. Familiarity with disclosure norms, vulnerability scoring systems (CVSS), and compliance frameworks (e.g., NIST, ISO/IEC 27001). Experience with automating cybersecurity workflows using open-source or commercial tools.

How strong is your resume?

Upload your resume and get feedback from our expert to help land this job