At BNY, our culture allows us to run our company better and enables employees’ growth and success. As a leading global financial services company at the heart of the global financial system, we influence nearly 20% of the world’s investible assets. Every day, our teams harness cutting-edge AI and breakthrough technologies to collaborate with clients, driving transformative solutions that redefine industries and uplift communities worldwide.
Recognized as a top destination for innovators and champions of inclusion, BNY is where bold ideas meet advanced technology and exceptional talent. Together, we power the future of finance – and this is what is all about. Join us and be part of something extraordinary.
We’re seeking a future team member for the role of Vulnerability Management Operations Associate to join our DEFEND Platform (Information Security Division) team. This role is located in Chennai
In this role, you’ll make an impact in the following ways:
Serve as vulnerability management analyst for information systems as primary responsibility
Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components.
Conduct risk-based assessment on security vulnerabilities and determine impact to various IT infrastructures.
Prioritize risks and drive remediation by outlining and providing advice and solutions to technology owners on effective security controls and counter measures.
Prioritize remediation activities based upon the results of the Enterprise-wide scanning program, Intel Threat advisories, or internal/external audits.
Engage with stakeholders, to include IT professionals, management, and auditors, to facilitate vulnerability discovery and remediation.
Communicate security and compliance issues in an effective and appropriate manner
Recommend appropriate remedial actions to mitigate risks and ensure information systems employ appropriate level of information security controls
Validate remedial actions and ensure compliance with information security policy and regulatory requirements.
Stay abreast on new security vulnerabilities and latest advancements in configuration compliance assessments from internal or external threat intelligence sources.
Contribute to the review of internal processes and activities and assist in identifying potential opportunities for improvement and automation.
Conducts adhoc vulnerability scans if needed and coordinates remediation with appropriate support teams.
Collaborate with our IT Stakeholders and LOB application owners.
3- 5 years of experience is required
To be successful in this role, we’re seeking the following:
Bachelors degree in information technology (or related field) with minimum of 5 years’ experience
Possess strong knowledge of various technologies and security topics including operating systems, network security, protocols, application security, infrastructure hardening and security baselines.
Knowledge of industry standards relating to Vulnerability Management including Common Vulnerabilities and Exposures (CVE), Common Vulnerability Scoring System (CVSS) and Open Web Application Security Project (OWASP) strongly desired.
Practical experience with identifying, analyzing, and communicating cyber threat and vulnerability information.
Hold key Cybersecurity Certifications, Security+, CISSP, CEH, SANS etc
Experience working with cloud technology (Azure, GCP, AWS.)
Strong working knowledge of vulnerability management toolsets (Qualys, Wiz.io, Xray Jfrog etc.)
Strong working knowledge of operational baselines hardening
Knowledge of sound, industry-accepted server software support practices and methodologies
Familiar with International Standards, NIST Special Publications and Cyber Security Frameworks
Experience with assessing vulnerability management programs
Familiarity with General IT infrastructure and enterprise architecture (e.g., Server, Network, Workstation, Cloud, etc.)
Familiarization with patching processes and related technologies (e.g. BladeLogic, SCCM)
Familiarity with enterprise risk management and how cyber threats and vulnerabilities integrate into ERM efforts
Background and knowledge of general cyber security concepts (e.g. defense-in-depth security architectures, security controls)
Exemplary verbal and written communication skills (English business fluent spoken and written)
Demonstrated ability to think strategically and perform detailed, complex analysis and data interpretation
Effective interpersonal skills, out-of-the-box thinking and ability to interface with all levels of staff
Ability to work under pressure and deal with ambiguous situations
Ability to read and write scripts in various languages. (php, python, ksh, powershell, SQL, and similar)
Experience and proficiency in a various toolsets and best practices.
Self-motivated and able to work in an independent manner.
At BNY, our culture speaks for itself, check out the latest BNY news at:
BNY Newsroom
BNY LinkedIn
Here’s a Few Of Our Recent Awards
America’s Most Innovative Companies, Fortune, 2025
World’s Most Admired Companies, Fortune 2025
“Most Just Companies”, Just Capital and CNBC, 2025
Our Benefits And Rewards
BNY offers highly competitive compensation, benefits, and wellbeing programs rooted in a strong culture of excellence and our pay-for-performance philosophy. We provide access to flexible global resources and tools for your life’s journey. Focus on your health, foster your personal resilience, and reach your financial goals as a valued member of our team, along with generous paid leaves, including paid volunteer time, that can support you and your family through moments that matter.
BNY is an Equal Employment Opportunity/Affirmative Action Employer - Underrepresented racial and ethnic groups/Females/Individuals with Disabilities/Protected Veterans.
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Associate Information Security Analyst II
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!