Vulnerability Management Lead

Posted 10 Days Ago
Be an Early Applicant
Toronto, ON, CAN
Hybrid
5-5 Annually
Senior level
Information Technology • Professional Services • Software • Consulting • Cybersecurity
Where deep cybersecurity expertise meets disciplined execution. Boutique consulting for enterprise-scale challenges.
The Role
The Vulnerability Management Lead oversees the vulnerability management program, ensuring effective identification, assessment, and remediation of vulnerabilities across varied environments.
Summary Generated by Built In

Role Overview: 

We are seeking a seasoned Vulnerability Management Lead to oversee and evolve our enterprise-wide threat and vulnerability management program. This role sits at the intersection of security operations and strategic program leadership — responsible for driving systematic identification, assessment, prioritization, and remediation of vulnerabilities across a complex global environment spanning on-premises infrastructure, cloud platforms, and hybrid deployments.

The ideal candidate brings both hands-on technical depth and the leadership acumen to engage stakeholders at all levels, from engineering teams executing remediations to executives requiring clear risk summaries. This is a high-impact position for someone passionate about operational excellence and continuous program improvement.

 

Key Responsibilties: 

•     Own the end-to-end vulnerability management lifecycle across enterprise environments including Windows and Linux operating systems, network infrastructure, cloud platforms (AWS and Azure), containerized applications, and digital certificate management.

•     Execute and oversee ongoing vulnerability scanning, risk prioritization, and structured remediation workflows across cloud and on-premises systems, applying recognized industry frameworks and security best practices.

•     Develop and maintain a metrics and reporting framework to measure program maturity, track remediation SLAs, and communicate risk posture to internal and external stakeholders — leveraging automation to reduce manual effort and improve accuracy.

•     Serve as the internal subject matter authority on vulnerability risk, providing guidance to both technical and non-technical teams on threat impact, exploitability, and remediation options — including endpoint protection, network-level controls, and cloud-native security mechanisms.

•     Build and maintain collaborative working relationships with cross-functional and global teams to ensure vulnerability risks are clearly communicated, tracked, and resolved in alignment with organizational risk appetite.

•     Lead root cause analyses following security events or remediation gaps, and produce clear executive-level reports summarizing findings, risk exposure, and recommended courses of action.

•     Support day-to-day program operations including documentation upkeep, policy and procedure development, and participation in incident response activities as required.

•     Continuously assess and improve program tooling, processes, and detection capabilities to stay ahead of the evolving vulnerability landscape and organizational scale.

•     Plan and coordinate security testing and validation exercises — including scan coverage reviews, finding validation, and remediation verification — across applications, infrastructure, and data environments.

•     Prepare and deliver SLA-aligned, volume-based, and risk-tiered reporting for internal leadership and external stakeholders as required.

 

Qualifications: 

•     Bachelor's degree in a relevant field with 5+ years of progressive experience in information security, with a focus on vulnerability management or security operations.

•     Demonstrated hands-on proficiency with enterprise vulnerability scanning platforms such as Rapid7, Qualys, Tenable, or Armis; familiarity with SIEM tooling, ticketing/workflow systems (e.g., ServiceNow Vulnerability Response), and hybrid cloud security environments (AWS, Azure).

•     Proven track record leading vulnerability management functions — including full-cycle scanning operations, risk communication, and remediation tracking across diverse technology environments.

•     Working knowledge of data visualization and reporting platforms such as Wiz, Snowflake, or Power BI, with strong proficiency in Excel and PowerPoint for stakeholder reporting and analysis.

•     Scripting experience in Python or PowerShell is an asset, particularly for automation of vulnerability workflows and process optimization.

•     Familiarity with security and compliance frameworks such as NIST CSF or ISO 27001 is beneficial.

•     Strong organizational skills with the ability to manage competing priorities independently while contributing effectively within collaborative team settings.

•     Exceptional communication skills — able to translate complex, technical vulnerability findings into business-relevant language for executive and non-technical audiences.

Skills Required

  • Bachelor's degree in a relevant field
  • 5+ years of experience in information security focusing on vulnerability management or security operations
  • Hands-on proficiency with enterprise vulnerability scanning platforms
  • Leadership experience in vulnerability management functions
  • Knowledge of data visualization and reporting tools
  • Scripting experience in Python or PowerShell
  • Familiarity with security and compliance frameworks like NIST CSF or ISO 27001
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Chicago, Illinois
23 Employees
Year Founded: 2017

What We Do

We help enterprise organizations design, implement, and sustain their most critical security and technology programs. Our work spans four core disciplines: cybersecurity solution design and delivery across IAM, Data Security, Network Security, Threat & Vulnerability Management, CDR & Application Security, GRC & Compliance, AI Security, Quantum Security, and OT Security; program and project management that keeps complex, multi-stakeholder initiatives on track; organizational change management that drives people-side adoption and ensures technology investments deliver lasting value; and M&A advisory and integration support that helps organizations navigate technology and security through the full transaction lifecycle. We don't hand off a roadmap and walk away — we stay in it with our clients through execution, transition, and long-term success.

Why Work With Us

At Pearl, you get the rigor of a premium consultancy and the ownership of a boutique firm. Work across cybersecurity delivery, program management, OCM, and M&A. Grow into new practice areas, wear multiple hats, and have a real voice in how we evolve.

Gallery

Gallery

Similar Jobs

WorkWhile Logo WorkWhile

Engineering Manager

Artificial Intelligence • HR Tech • Information Technology • Machine Learning • Software • App development • Industrial
Hybrid
4 Locations
100 Employees
250K-270K Annually

Airwallex Logo Airwallex

Account Executive

Artificial Intelligence • Fintech • Payments • Business Intelligence • Financial Services • Generative AI
Remote or Hybrid
Toronto, ON, CAN
2000 Employees

Airwallex Logo Airwallex

GTM Partnerships Manager, Canada

Artificial Intelligence • Fintech • Payments • Business Intelligence • Financial Services • Generative AI
Remote or Hybrid
Toronto, ON, CAN
2000 Employees

Arm Logo Arm

Senior Principal SOC Power Lead

Artificial Intelligence • Internet of Things • Semiconductor
Hybrid
Toronto, ON, CAN
8314 Employees
228K-308K Annually

Similar Companies Hiring

Golden Pet Brands Thumbnail
Digital Media • eCommerce • Information Technology • Marketing Tech • Pet • Retail • Social Media
El Segundo, California
178 Employees
Kepler  Thumbnail
Fintech • Software
New York, New York
6 Employees
Onshore Thumbnail
Software
US
100 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account