About the Role
We are looking for a cybersecurity-focused, detail-driven Lead Vulnerability Database Analyst to support a global client’s vulnerability intelligence operations. In this role, you will be responsible for maintaining the integrity, accuracy, and relevance of a high-impact vulnerability database. You will collaborate with cybersecurity researchers, vendors, and internal teams to classify, validate, and manage vulnerability data in alignment with industry standards such as CVE and NVD. Your contributions will directly support threat detection, mitigation planning, and responsible vulnerability disclosure on a global scale.
Key Responsibilities
- Review and validate incoming vulnerability reports for accuracy, completeness, and contextual relevance.
- Maintain and enhance the vulnerability database by documenting key details, impact assessments, mitigation strategies, and severity levels.
- Collaborate with global researchers, vendors, and disclosure bodies to ensure ethical and responsible reporting.
- Analyze vulnerabilities using CVE standards and contribute to classification workflows.
- Monitor Indicators of Compromise (IOCs), exploit trends, and emerging threat vectors.
- Leverage automation and scripting (e.g., Python, Bash) for data validation and enrichment tasks.
- Produce clear and concise documentation, including summary reports and technical bulletins.
- Ensure compliance with cybersecurity frameworks and responsible handling of sensitive information.
Required Skills & Experience
- Solid foundation in cybersecurity principles, vulnerability lifecycle management, and threat intelligence.
- Working knowledge of global vulnerability repositories like the National Vulnerability Database (NVD) and the Common Vulnerabilities and Exposures (CVE) system.
- Proficiency in scripting languages (Python/Bash) to automate analytical workflows and data integrity checks.
- Strong analytical mindset with the ability to interpret complex exploit mechanics and risk severity.
- Effective communicator—able to liaise with both technical and non-technical stakeholders.
- Experience with structured databases, version control systems, and cybersecurity toolkits.
Preferred Skills & Qualifications
- 4–5 years of hands-on experience in vulnerability research, security operations, or cyber threat analysis.
- Professional certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or equivalent.
- Background in ethical hacking, penetration testing, or security tool development.
- Familiarity with disclosure norms, vulnerability scoring systems (CVSS), and compliance frameworks (e.g., NIST, ISO/IEC 27001).
- Experience with automating cybersecurity workflows using open-source or commercial tools.
Soft Skills
- Precision-oriented mindset with a passion for accuracy and quality.
- Collaborative approach, with the ability to work cross-functionally in a global and multicultural team.
- Ethical, discreet, and trustworthy in managing sensitive cybersecurity information.
- Curious and self-motivated to stay updated on emerging exploits and cyber threats.
Application Process
If you’re passionate about securing digital landscapes through intelligence-led vulnerability management, and thrive in an analytical, mission-critical role - join us!
We value inclusivity, innovation, and a relentless focus on quality.
Kindly send your updated resume to careers@pitsolutions.com