Product Security Expert
We are looking for an execution‑oriented Vulnerability Management professional who can navigate complex threat scenarios and remain committed to decreasing the overall attack surface of SAP workloads within Sovereign Cloud Services. Vulnerability Management remains a top priority, presenting the opportunity to be in a key role, together with the support and empowerment needed to be successful. You will complete each day with a sense of pride and accomplishment, knowing that your contributions have made a positive impact on the security posture of the organization and company as a whole.
Responsibilities:
- Develop, implement, maintain, and socialize the strategic vision pertaining to your area, e.g., testing, validation, post‑production security operations, etc.
- Proxy issues between Product and Regional Operations teams with additional enrichment, actionable guidance, and higher support.
- Provide expertise in cross‑functional team initiatives and process improvement projects.
- Play a key role in operational reporting & metrics capability, ensuring all products and regions within Sovereign Cloud can adequately be measured towards compliance to the standard set for Enterprise Vulnerability Management, as well as Sovereign Cloud Security baseline requirements.
- Strengthen relationships between security and other functional teams; act as a security champion to help build a culture that sees security as an enabler.
- Establish/participate in learning circles with other product(s)/application(s)/service(s) security professionals across cross line of businesses to share best practices and lessons learned.
Requirements:
- Superior knowledge of Vulnerability Management processes for Infrastructure, Cloud‑Native, and Product alike.
- Foundational knowledge in Linux, Windows, and containerized systems.
- Experience analyzing, triaging, and remediating common information security issues.
- Proficiency with Vulnerability Management Tools (e.g., Tenable.io, Tenable Security Center, Rapid7 InsightVM).
- Ability to be an active listener and employ various levels of listening as required by the needs of those you coach.
- Technology skills and willingness to learn new topics quickly.
- Problem‑solving, presentation, communication, and interpersonal skills.
- Ability to think strategically, delivering services to meet stakeholders’ demands on a timely basis.
- Understanding of common attacker tactics, tools, and techniques.
- Ability to build trusted relationships with key stakeholders.
- Persistence, self‑motivation and willingness to work under pressure.
- Proven ability to work in cross‑functional teams.
- Excellent problem‑solving, investigative, and written and verbal communication skills.
- Ability to speak and write in English fluently.
Work Experience:
- Bachelor’s degree or equivalent experience.
- 5 years of experience working in security area with relevant realm of responsibilities.
- Knowledge of security frameworks and best practices.
- Knowledge of development security operations principles.
- Established and matured cross‑company processes around vulnerability management including operating models, maturity models, Service Level Agreement (SLA)/Service Level Objectives (SLOs), discovery, managing and reporting processes, roles/responsibilities, etc.
- Coordinated resolution of cross‑company issues that arose from vulnerabilities, having worked with internal and industry stakeholders to comprehensively remediate security risk.
- Security Certifications like CISSP, CISM, CCSP, Security+, etc. are an asset.
Due to the potentially classified nature of our work, your willingness is required to subject yourself to a governmental security clearance process.
SAP is committed to the values of Equal Employment Opportunity and provides accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e‑mail with your request to Recruiting Operations Team:
For information on the responsible use of AI in our recruitment process, please refer to our Guidelines for Ethical Usage of AI in the Recruiting Process. Please note that any violation of these guidelines may result in disqualification from the hiring process.
Requisition ID: | Work Area: Information Technology | Expected Travel: 0 – 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations:
#J-18808-Ljbffr
Kontaktperson:
SAP HR Team