Information Security Vulnerability Analyst
Cairo, Egypt
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
MigrationIT
MigrationIT connects employers with IT professionals who are equipped to fulfill an employer’s distinct IT needs. The agency provides IT talents for several industries, including healthcare, banking, insurance, software development, retail,...- Analyze organization's cyber defense policies and configurations and evaluate compliance with
regulations and organizational directives.
- Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and
hardware) to support cyber defense audit missions.
-
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents
specifically related to cyber defense auditing.
- Prepare audit reports that identify technical and procedural findings and provide recommended
remediation strategies/solutions.
- Perform technical (evaluation of technology) and nontechnical (evaluation of people and
operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local
computing environment, network and infrastructure, enclave boundary, supporting infrastructure,
and applications).
- Follow the day-to-day operations related to own jobs in the department to ensure continuity of work
Requirements
- Bachelor’s degree or higher in Computer Science, Engineering, or any other related field.
- Experience with a variety of operating systems including Windows, Linux or UNIX, CEH,
CISSP, well known protocols and services (FTP, HTTP, SSH, SMB) preferred
- Packet Analysis Tools.
- Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems
- Skill in the use of penetration testing tools and techniques.
- Skill in using network analysis tools to identify vulnerabilities
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
16
4
0
Category:
Analyst Jobs
Tags: Audits CEH CISSP Compliance Computer Science Cyber defense Linux Pentesting SSH UNIX Vulnerabilities Vulnerability scans Windows
Region:
Middle East
Country:
Egypt
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Cybersecurity Engineer jobsSenior Security Analyst jobsInformation System Security Officer jobsIT Security Analyst jobsSenior Information Security Analyst jobsSenior Cloud Security Engineer jobsCyber Security Specialist jobsSecurity Operations Engineer jobsSenior Product Security Engineer jobsInformation Security Manager jobsSenior Network Security Engineer jobsInformation System Security Officer (ISSO) jobsSenior Information Security Engineer jobsSecurity Consultant jobsSenior Cyber Security Engineer jobsChief Information Security Officer jobsSecurity Specialist jobsInformation Systems Security Engineer jobsCyber Threat Intelligence Analyst jobsIT Security Engineer jobsSenior Software Engineer jobsNetwork Engineer jobsCybersecurity Specialist jobsSecurity Operations Analyst jobsSenior IT Auditor jobs
Bash jobsSecurity assessment jobsEDR jobsTS/SCI jobsEncryption jobsSDLC jobsIDS jobsSQL jobsThreat detection jobsRMF jobsMalware jobsITIL jobsSplunk jobsTerraform jobsFinance jobsCompTIA jobsIPS jobsOWASP jobsTop Secret jobsSOC 2 jobsForensics jobsDocker jobsActive Directory jobsGIAC jobsClearance Required jobs
CRISC jobsHIPAA jobsOSCP jobsTCP/IP jobsMITRE ATT&CK jobsDoDD 8570 jobsIntrusion detection jobsVPN jobsCCSP jobsAnsible jobsZero Trust jobsSOAR jobsDNS jobsJavaScript jobsUNIX jobsData Analytics jobsIT infrastructure jobsKPIs jobsJira jobsIndustrial jobsSOX jobsNIST 800-53 jobsGCIH jobsSANS jobsMachine Learning jobs