Devoteam Cyber Trust | Vulnerability Analyst
Lisboa, Portugal
Devoteam
Transform your bussines with Devoteam, the AI-driven tech consulting. Become a leading company embracing AI for sustainable value.Company Description
Devoteam Cyber Trust is the Cybersecurity specialist arm of the Devoteam Group. With our 800+ experts located across EMEA, we aim to establish cybersecurity as an enabler of business success rather than a gatekeeper. We leverage an end-to-end approach to Cyber Resilience, Applied Security, and Managed Security services to secure the tech journey of large and medium-sized companies from all sectors and industries.
Since 2009, previously known as INTEGRITY, our team based in Portugal is specialised in providing cutting-edge Managed Security Services that combine its expertise and proprietary technology to consistently and effectively reduce the cyber risk of our clients.
The comprehensive service range includes Persistent Intrusion Testing, ISO 27001, PCI-DSS, GRC Consulting and Solutions, and Third-Party Risk Management. ISO 27001 (Information Security) and ISO 9001 (Quality) certified, PCI-QSA, and member of CREST and CIS - Centre for Internet Security, we provide services to a considerable number of clients, operating in more than 20 countries.
Job Description
As a Vulnerability Analyst, you will have the main responsibility of managing the life cycle of vulnerabilities, ensuring the analysis, characterization, prioritization and communication of vulnerabilities, as well as the monitoring of indicators and continuous improvement of associated processes.
Vulnerability Management:
Involves identifying, prioritizing, and mitigating vulnerabilities in IT systems to prevent exploitation by attackers. It includes continuous scanning, patch management, and tracking vulnerabilities over time.
Threat Analysis Based on Client's Industry:
Tailored threat assessments based on the specific risks and cyber threats faced by the client’s industry (e.g., finance, healthcare, technology), helping to focus on the most relevant security issues.
Production of Indicators of Compromise (IOC):
Creation of specific patterns (e.g., IP addresses, file hashes) linked to malicious activity to detect and respond to cyberattacks.
Malware Reverse Engineering:
Analyzing malicious software to understand its behavior, identify vulnerabilities, and develop defenses to protect systems from similar future attacks.
Publication of Threat Analyses and Reports:
Sharing detailed reports on key threats, vulnerabilities, and recommended actions with stakeholders to improve overall security and inform risk mitigation strategies.
Qualifications
- Higher Academic Training in Computer Engineering, Electrotechnical or equivalent experience
- Proficiency with tools like Nessus, Qualys, OpenVAS, and Rapid7 for identifying and assessing vulnerabilities in IT systems
- Knowledge in IPv4 ,IPv6, DNS
- Knowledge in creating IOCs using tools like YARA, Sigma, or STIX/TAXII formats for sharing threat intelligence
- Ability to exploit vulnerabilities
- Ability to identify and manage risks
- Ability to communicate and interpersonal relationships
- Responsibility, proactivity, autonomy and dynamism
- Critical and results-oriented thinking
- Capacity for leadership and teamwork
Additional Information
Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CREST DNS Exploit Finance ISO 27001 Malware Monitoring Nessus OpenVAS Qualys Reverse engineering Risk management Threat intelligence Vulnerabilities Vulnerability management
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.