
Cybersecurity and Vulnerability Management Specialist
- Roma
- Tempo indeterminato
- Full time
- Design and coordinate adversarial validation activities such as penetration tests, threat exposure assessments, and red/purple team exercises to identify detection gaps, exploitable weak points and assess their risk impact in real-world scenarios.
- Validate findings to confirm exploitability, assess risk levels, and guide prioritization of remediation efforts, leveraging team input and expertise and guiding integration into WFP’s threat exposure management program.
- Collaborate with relevant teams and provide technical direction to ensure timely mitigation of validated vulnerabilities or detection gaps.
- Develop clear reports and dashboards that highlight key findings, including critical vulnerabilities, attack paths, and remediation progress for stakeholder visibility.
- Communicate adversarial validation findings, risks, and remediation strategies effectively to senior leadership and stakeholders.
- Continuously refine validation techniques based on emerging threat intelligence, vulnerabilities, and attack methods to maintain program relevance and effectiveness.
- Prioritize vulnerabilities based on adversarial validation outcomes, focusing on those posing the highest risk to the organization’s operations, and coordinate team efforts accordingly.
- Perform other cybersecurity related duties as assigned.
- Comprehensive Adversarial Validation Reports: Developed in coordination with a small technical team, including findings, attack paths, categorized vulnerabilities, proof of concept, and real-world risk impact.
- Prioritized Mitigation Recommendations: Actionable strategies based on business impact and organizational risk, incorporating team-driven insights to address critical gaps and improve security posture.
- Integrated Workflows & Threat Exposure Alignment: Team-supported automation and structured processes for embedding validation results into vulnerability management and threat intelligence programs.
- Stakeholder Communication Briefs: Executive-level summaries and presentations reflecting the team’s findings and strategic recommendations, tailored based on different audiences.
- Refined Validation Methodology: Updated adversarial validation techniques and documentation, developed collaboratively and incorporating lessons learned across the team.
- University Degree in Information Technology, Information Systems, Cybersecurity, or related fields or a combination of relevant education and experience.
- At least 5 years of experience in cybersecurity, with focus on vulnerability management and threat exposure management.
- Sound IT Security skills, with both academic background and practical hands-on experience
- In-depth understanding of vulnerability management frameworks, processes, and best practices.
- Experience with vulnerability scanning processes, tools and remediation workflows.
- Familiarity with security concepts such as threat modeling, asset classification, and risk-based decision-making.
- Experience with penetration testing, and adversarial emulation activities that aid in identifying potential attack vectors and their impact.
- Previous experience in international or UN environments is valued, but not essential.
- IT Audit and/or PM certifications are desirable, though equivalent hands-on experience is equally appreciated.
- Strong organisational and communication skills.