As a Vulnerability Analyst, you will have the main responsibility of managing the life cycle of vulnerabilities, ensuring the analysis, characterization, prioritization and communication of vulnerabilities, as well as the monitoring of indicators and continuous improvement of associated processes.
Vulnerability Management:
Involves identifying, prioritizing, and mitigating vulnerabilities in IT systems to prevent exploitation by attackers. It includes continuous scanning, patch management, and tracking vulnerabilities over time.
Threat Analysis Based on Client's Industry:
Tailored threat assessments based on the specific risks and cyber threats faced by the client’s industry (e.g., finance, healthcare, technology), helping to focus on the most relevant security issues.
Production of Indicators of Compromise (IOC):
Creation of specific patterns (e.g., IP addresses, file hashes) linked to malicious activity to detect and respond to cyberattacks.
Malware Reverse Engineering:
Analyzing malicious software to understand its behavior, identify vulnerabilities, and develop defenses to protect systems from similar future attacks.
Publication of Threat Analyses and Reports:
Sharing detailed reports on key threats, vulnerabilities, and recommended actions with stakeholders to improve overall security and inform risk mitigation strategies.
Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.