Currency

Vulnerability and Configuration Management Analyst (Engineer)

Security

Vulnerability and Configuration Management Analyst (Engineer)

Security

Poleczki 21, Warszawa

METTLER TOLEDO

Full-time
Permanent
Mid
Hybrid

Tech stack

    English

    C1

    Vulnerability Management

    regular

    Configuration management

    regular

    Security frameworks

    regular

    ISO 27001

    regular

    CISSP

    nice to have

    CISM

    nice to have

    CompTIA Security+

    nice to have

    NIST

    nice to have

    CIS

    nice to have

Job description

METTLER TOLEDO is a global leader in precision instruments and services. We are renowned for innovation and quality across laboratory, process analytics, industrial, product inspection, and retailing applications. Our sales and service network is one of the most extensive in the industry. Our products are sold in more than 140 countries, and we have a direct presence in approximately 40 countries. For more information, please visit www.mt.com.


We invite you to join our team as a Vulnerability and Configuration Management Engineer. 


The role is responsible for identifying, assessing, and mitigating security vulnerabilities across the organization's IT environment, as well as managing and maintaining secure and consistent system configurations. 

This role involves conducting vulnerability assessments, coordinating remediation efforts, enforcing configuration management policies, and ensuring compliance with security standards.


You will be a vital contributor to build the road map for vulnerability, cyber threads and configuration management. 


Key Responsibilities:

  • Vulnerability Management:

    • Identify, assess, and prioritize security vulnerabilities across the organization's IT infrastructure.

    • Conduct regular vulnerability scans and penetration testing.

    • Collaborate with IT and security teams to remediate vulnerabilities in a timely manner.

    • Maintain and update vulnerability databases and reports.

    • Track and monitor the status of vulnerabilities and mitigation efforts.

    • Ensure compliance with relevant security policies, standards, and regulatory

  • Configuration Management:

    • Develop and maintain configuration management policies and procedures.

    • Manage and control changes to IT systems and software configurations.

    • Maintain accurate configuration records and documentation.

    • Implement and oversee configuration baseline standards.

    • Collaborate with IT teams to ensure secure and consistent system configurations.

    • Monitor configuration changes to detect unauthorized or insecure modifications.

  • General Responsibilities:

    • Seeking a skilled professional to serve as a mentor and subject matter expert for our analyst team, providing guidance, supervision, and expertise to drive excellence.

    • Work closely with cross-functional teams to improve overall security posture.

    • Prepare reports and dashboards for management regarding vulnerability and configuration status.

    • Participate in security audits and assessments related to vulnerability and configuration management.

    • Guide employees and stakeholders to ensure they are aware of security best practices and understand their role in protecting the cloud environment.

    • Stay up to date with the latest security trends, threats, and vulnerabilities and provide recommendations for improving the security posture of the cloud environment.


What You Need to Succeed:

  • 3 years of experience and knowledge of vulnerability management (vulnerability assessment tools and methodologies) and configuration management (tools and best practices),

  • Understanding of network, system, and application security principles,

  • Ability to analyze and prioritize vulnerabilities based on risk,

  • Knowledge of security frameworks and standards (e.g., ISO 27001),

  • Excellent communication in English and collaboration abilities,

  • Analytical skills and operational mindset.

That will be your asset: 

  • Relevant certifications such as CISSP, CISM, or CompTIA Security+, 

  • Knowledge of NIST and CIS - security frameworks and standards. 

If you are passionate about Vulnerability and Configuration Management Engineer and have the qualifications and experience, we encourage you to apply for this exciting opportunity.


Our Offer to You:

  • Contract of employment [umowa o pracę], we are looking for a long term cooperation,

  • Annual reward,

  • Flexible working hours,

  • Hybrid work model (up to 3 days a week from home, 2 days from the office),

  • A diverse and inclusive workplace.

  • Festive benefits paid in April and December,

  • Medical care with basic dental package (Medicover), with possibility to extend to Damian Medical Center,

  • Possibility to extend medical care to family members,

  • Life insurance with possible extended scope,

  • Sports card (Medicover),

  • Language courses,

  • A vast training offer to support your development,

  • Wellbeing activities, CSR, with space for your initiatives*

  • Discounts for meals and special offers at Platan Business Park.

*We are focusing on entertainment and supporting your physical and mental health – check out our LinkedIn profile!

Tech stack

    English

    C1

    Vulnerability Management

    regular

    Configuration management

    regular

    Security frameworks

    regular

    ISO 27001

    regular

    CISSP

    nice to have

    CISM

    nice to have

    CompTIA Security+

    nice to have

    NIST

    nice to have

    CIS

    nice to have

Office location

Published: 24.10.2025

Vulnerability and Configuration Management Analyst (Engineer)

Summary of the offer

Vulnerability and Configuration Management Analyst (Engineer)

Poleczki 21, Warszawa

METTLER TOLEDO

By applying, I consent to the processing of my personal data for the purpose of conducting the recruitment process. Informujemy, że administratorem danych jest Mettler-Toledo Sp.z.o.o. z siedzibą w Warszawie, ul. Poleczki 21 (dalej jako "administrato... MoreThis site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ADVERTISEMENT: Recommended by Just Join IT