N…

L2 Vulnerability Management Engineer

Full-time On-site Mid Level Lusaka, ZM
Posted 3 hours, 4 minutes ago ⏰ Deadline: May 1, 2026 1 views 0 applications

Job Description

Job Description

We are seeking a highly skilled and detail-oriented L2 Vulnerability Management Engineer to join our cybersecurity team. The successful candidate will be responsible for identifying, analyzing, and remediating security vulnerabilities across systems, networks, and applications, ensuring the organization maintains a strong security posture.

Key Responsibilities

  • Perform vulnerability assessments across servers, endpoints, network devices, and applications.
  • Analyze vulnerability scan results and prioritize remediation based on CVSS scores and business impact.
  • Execute remediation actions including patching, configuration hardening, and mitigation techniques.
  • Conduct root cause analysis for recurring vulnerabilities and recommend long-term solutions.
  • Collaborate with SOC teams for incident correlation, threat analysis, and remediation tracking.
  • Validate and enforce secure TLS configurations, protocols, and cipher suites.
  • Identify and remediate vulnerabilities related to outdated protocols, weak encryption, and misconfigurations.
  • Work closely with application, infrastructure, and network teams to ensure secure implementations.
  • Manage OS and application patching, including testing and deployment coordination.
  • Perform system hardening based on industry standards (e.g., CIS benchmarks).
  • Monitor vulnerability trends and provide proactive risk reduction recommendations.
  • Track remediation lifecycle and ensure closure within defined SLAs.
  • Prepare detailed vulnerability reports, dashboards, and executive summaries.
  • Support audits, compliance checks, and regulatory requirements.
  • Utilize tools such as Qualys, Nessus, or similar vulnerability management platforms.
  • Stay updated on emerging threats, CVEs, and security advisories.
  • Promote security awareness and best practices across teams.

Minimum Requirements

  • Bachelor’s degree in Information Security, Computer Science, IT, or a related field.
  • 3-5 years experience in vulnerability management, security operations, or a similar role.
  • Hands-on experience with vulnerability scanning tools (e.g., Qualys, Nessus).
  • Strong understanding of network security, operating systems, and application security.
  • Knowledge of patch management and system hardening practices.
  • Familiarity with security frameworks and standards (e.g., ISO 27001, CIS benchmarks).
  • Strong analytical, problem-solving, and communication skills.

Certifications (Added Advantage)

  • CEH (Certified Ethical Hacker).
  • CompTIA Security+.
  • ISO/IEC 27001 Certification.
  • Qualys Certified Specialist or equivalent.
  • GIAC Certifications (e.g., GSEC, GPEN).
  • Microsoft or Linux Security Certifications.

How to Apply

Please submit your application to [insert email].

Apply Now ↗

How well do you match?

Get an instant AI match score for this role — free, takes 3 minutes.

Tailor your CV for this role

Start with a free job match to see how well you fit. Then order a tailored CV.

Join Our Zambia Channels

Get free job alerts on your phone

MJC
ECHO
Your MJC Assistant

I'm ECHO, your MJC career assistant. I can help you find jobs, explore career tools, and connect with opportunities across Africa.

How was your experience with ECHO?