Telecommunications Sector | Vulnerability Analyst
Devoteam : Transform your business with Devoteam, the AI-driven tech consulting. Become a leading company embracing AI for sustainable value.
At Devoteam, we believe that technology with strong human values can actively drive change for the better. Discover how Tech for People unlocks the future, creating a positive impact on the people and the world around us. We are a global leading player in Digital Transformation for leading organisations across EMEA, with a revenue of €1B. We are proud of our diverse environment. Because we are #TechforPeople. Join our multidisciplinary team of Cloud experts, Designers, Business consultants, Security experts, Engineers, Developers and other extraordinary talents, spread across more than 20 EMEA countries.
Job Description
As a Vulnerability Analyst , you will have the main responsibility of managing the life cycle of vulnerabilities, ensuring the analysis, characterization, prioritization and communication of vulnerabilities, as well as the monitoring of indicators and continuous improvement of associated processes.
Vulnerability Management :
Involves identifying, prioritizing, and mitigating vulnerabilities in IT systems to prevent exploitation by attackers. It includes continuous scanning, patch management, and tracking vulnerabilities over time.
Threat Analysis Based on Client's Industry :
Tailored threat assessments based on the specific risks and cyber threats faced by the client's industry (e.g., finance, healthcare, technology), helping to focus on the most relevant security issues.
Production of Indicators of Compromise (IOC) :
Creation of specific patterns (e.g., IP addresses, file hashes) linked to malicious activity to detect and respond to cyberattacks.
Malware Reverse Engineering :
Analyzing malicious software to understand its behavior, identify vulnerabilities, and develop defenses to protect systems from similar future attacks.
Publication of Threat Analyses and Reports :
Sharing detailed reports on key threats, vulnerabilities, and recommended actions with stakeholders to improve overall security and inform risk mitigation strategies.
Qualifications
Higher Academic Training in Computer Engineering, Electrotechnical or equivalent experience
Proficiency with tools like Nessus, Qualys, OpenVAS, and Rapid7 for identifying and assessing vulnerabilities in IT systems
Knowledge in IPv4, IPv6, DNS
Knowledge in creating IOCs using tools like YARA, Sigma, or STIX/TAXII formats for sharing threat intelligence
Ability to exploit vulnerabilities
Ability to identify and manage risks
Ability to communicate and build interpersonal relationships
Responsibility, proactivity, autonomy, and dynamism
Critical and results-oriented thinking
Capacity for leadership and teamwork
Additional Information
Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.
#J-18808-Ljbffr