
Threat and Vulnerability Management Engineer
- Petaling Jaya, Selangor
- Permanent
- Full-time
Security Consultant (Senior Individual Contributor)Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity.Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence.Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations.Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value.Provides mentorship and technical leadership within project teams, though not in a formal people management role.Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance.Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance.Represents DXC Security in customer engagements as a subject matter expert and technical authority.Technical Skills and Experience Required:Essential Requirements:3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio.Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments.Experience in at least 2 of the following technologies is required:Tenable VM (via Vulcan Platform)Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle managementRisk-based prioritization and remediation orchestrationIntegration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA trackingCustom dashboards and compliance reportingArmisDeployment for agentless visibility into unmanaged, IoT, and OT assetsIntegration with SIEM and ITSM platformsRisk scoring, threat detection, and segmentation recommendationsReal-time alerting and policy enforcementITSM IntegrationWorkflow automation for vulnerability triage and remediationClosed-loop feedback between detection and resolutionExperience with ServiceNow and similar platformsCheck PointPalo AltoBlue CoatFortinetFireEyeAV Solutions (e.g., Symantec, McAfee)DLPAdvantageous:Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis).Experience in regulated industries or environments with stringent compliance requirements.Additional Information:Travel: Required for client site visits, project implementations, or stakeholder engagementsLearn more about DXC's Security team -Instagram:Youtube:TikTok:WebsiteAt DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available .