Telecommunications Sector | Vulnerability Analyst

Lisboa, Portugal

Devoteam

Transform your bussines with Devoteam, the AI-driven tech consulting. Become a leading company embracing AI for sustainable value.

View all jobs at Devoteam

Apply now Apply later

Company Description

At Devoteam, we believe that technology with strong human values can actively drive change for the better. Discover how Tech for People unlocks the future, creating a positive impact on the people and the world around us. We are a global leading player in Digital Transformation for leading organisations across EMEA, with a revenue of €1B. We believe in transforming technology to create value for our clients, partners and employees in a world where technology is developed for people. We are proud of the culture we have built together. We are proud of our people at the service of technology. We are proud of our diverse environment. Because we are #TechforPeople. Join our multidisciplinary team of Cloud experts, Designers, Business consultants, Security experts, Engineers, Developers and other extraordinary talents, spread across more than 20 EMEA countries. Become one of our +10.000 tech and business leaders on cloud, data and cyber security. Let’s fuse creativity with technology together and build innovative solutions that actively change things for the better.

Job Description

As a Vulnerability Analyst, you will have the main responsibility of managing the life cycle of vulnerabilities, ensuring the analysis, characterization, prioritization and communication of vulnerabilities, as well as the monitoring of indicators and continuous improvement of associated processes.

Vulnerability Management:
Involves identifying, prioritizing, and mitigating vulnerabilities in IT systems to prevent exploitation by attackers. It includes continuous scanning, patch management, and tracking vulnerabilities over time.

Threat Analysis Based on Client's Industry:
Tailored threat assessments based on the specific risks and cyber threats faced by the client’s industry (e.g., finance, healthcare, technology), helping to focus on the most relevant security issues.

Production of Indicators of Compromise (IOC):
Creation of specific patterns (e.g., IP addresses, file hashes) linked to malicious activity to detect and respond to cyberattacks.

Malware Reverse Engineering:
Analyzing malicious software to understand its behavior, identify vulnerabilities, and develop defenses to protect systems from similar future attacks.

Publication of Threat Analyses and Reports:
Sharing detailed reports on key threats, vulnerabilities, and recommended actions with stakeholders to improve overall security and inform risk mitigation strategies.

Qualifications

  • Higher Academic Training in Computer Engineering, Electrotechnical or equivalent experience
  • Proficiency with tools like Nessus, Qualys, OpenVAS, and Rapid7 for identifying and assessing vulnerabilities in IT systems
  • Knowledge in IPv4 ,IPv6, DNS
  • Knowledge in creating IOCs using tools like YARA, Sigma, or STIX/TAXII formats for sharing threat intelligence
  • Ability to exploit vulnerabilities
  • Ability to identify and manage risks
  • Ability to communicate and interpersonal relationships
  • Responsibility, proactivity, autonomy and dynamism
  • Critical and results-oriented thinking
  • Capacity for leadership and teamwork

Additional Information

Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Cloud DNS Exploit Finance Malware Monitoring Nessus OpenVAS Qualys Reverse engineering Threat intelligence Vulnerabilities Vulnerability management

Region: Europe
Country: Portugal

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.