We are looking for you, if you have:
- Bachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field, relevant certifications
- Minimum of 1 year of experience in vulnerability management, threat intelligence, or a related field,
- Analytical and problem-solving skills, ability to interpret complex data and provide actionable insights,
- Proven ability to work collaboratively in a team-oriented environment.
- English-C1/B2
Youll get extra points for:
- Master’s degree in Cybersecurity , computer science or comparable degree,
- Cyber Security certification (like: CISSP, CySA+, CEH)
- IT related certification (like: RHCSA, MCSA, CCNA)
- 3 years’ experience in a similar role,
- Experience in usage and configuring cyber threat intelligence tools,
- Proficiency with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7), strong understanding of network protocols, operating systems, and security frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain, NIST
- Experience in cloud provisioning, knowledge of Infrastructure as Code
- International work experience with strong network within international security initiatives.
Your responsibilities:
- Vulnerability Assessment: Conduct regular vulnerability assessments using industry-standard tools and methodologies to identify security weaknesses in our systems, applications, and networks.
- Intelligence Gathering: Monitor and collect vulnerability intelligence from diverse sources, including security advisories, threat feeds, open-source intelligence (OSINT), and dark web forums.
- Analysis and Reporting: Analyze vulnerability data to determine the potential impact on the organization. Prepare detailed reports and risk assessments for key stakeholders, highlighting critical vulnerabilities and recommended remediation steps.
- Threat Mitigation: Collaborate with the Incident Response, IT, and Development teams to prioritize and address identified vulnerabilities. Provide guidance on best practices for vulnerability mitigation and security hardening.
- Threat Modeling: Develop and maintain threat models to anticipate potential attack vectors and identify vulnerabilities in new and existing systems.
- Tool Management: Manage and maintain vulnerability scanning tools and platforms. Ensure tools are updated with the latest signatures and configurations to provide accurate and comprehensive assessments.
- Continuous Improvement: Stay current with the latest vulnerability trends, attack vectors, and security technologies.
- Compliance: Ensure all vulnerability management activities comply with relevant industry standards, regulations, and internal policies.
Information about the squad:
Global Threat Management
The key mission of GTM is to enable stakeholders to be a step ahead in an ever-changing world by delivering outstanding intelligence products and services. The team proactively identifies threats, illuminates complex topics and provides actionable recommendations to stakeholders. By combining people from various background the team ensures a thorough understanding of all levels of the threat landscape providing a depth and breadth coverage of relevant threats and events.