Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
At Devoteam, we believe that technology with strong human values can actively drive change for the better. Discover how Tech for People unlocks the future, creating a positive impact on the people and the world around us. We are a global leading player in Digital Transformation for leading organisations across EMEA, with a revenue of €1B. We believe in transforming technology to create value for our clients, partners and employees in a world where technology is developed for people. We are proud of the culture we have built together. We are proud of our people at the service of technology. We are proud of our diverse environment. Because we are #TechforPeople. Join our multidisciplinary team of Cloud experts, Designers, Business consultants, Security experts, Engineers, Developers and other extraordinary talents, spread across more than 20 EMEA countries. Become one of our +10.000 tech and business leaders on cloud, data and cyber security. Let’s fuse creativity with technology together and build innovative solutions that actively change things for the better.
As a Vulnerability Analyst, you will have the main responsibility of managing the life cycle of vulnerabilities, ensuring the analysis, characterization, prioritization and communication of vulnerabilities, as well as the monitoring of indicators and continuous improvement of associated processes.
Vulnerability Management:
Involves identifying, prioritizing, and mitigating vulnerabilities in IT systems to prevent exploitation by attackers. It includes continuous scanning, patch management, and tracking vulnerabilities over time.
Threat Analysis Based on Client's Industry:
Tailored threat assessments based on the specific risks and cyber threats faced by the client’s industry (e.g., finance, healthcare, technology), helping to focus on the most relevant security issues.
Production of Indicators of Compromise (IOC):
Creation of specific patterns (e.g., IP addresses, file hashes) linked to malicious activity to detect and respond to cyberattacks.
Malware Reverse Engineering:
Analyzing malicious software to understand its behavior, identify vulnerabilities, and develop defenses to protect systems from similar future attacks.
Publication of Threat Analyses and Reports:
Sharing detailed reports on key threats, vulnerabilities, and recommended actions with stakeholders to improve overall security and inform risk mitigation strategies.
Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.