




Job Summary: This role involves analyzing and implementing security controls, conducting penetration testing and vulnerability analysis, monitoring for suspicious activities, and responding to security incidents. Key Highlights: 1. Hands-on operation with corporate security tools 2. Continuous monitoring and response to security incidents 3. Technical audits and continuous security improvement **Description:** ---------------- Security Controls Analysis and Implementation: Assess information security risks and implement technical controls to mitigate threats and vulnerabilities. Security Testing: Proactively conduct penetration tests (pentest) and vulnerability analyses to identify and remediate flaws before exploitation. Monitoring and Incident Response: Continuously monitor environments for suspicious activities and respond to security incidents by investigating and containing attacks. Audits and Continuous Improvement: Conduct technical audits and security reviews to ensure compliance with industry policies and standards, proposing and implementing improvements. Hands-on Operation: Directly work with security tools to configure, manage, and optimize the organization's protection infrastructure. **Requirements:** ----------------- Bachelor's degree in Information Systems, Computer Science, Computer Networks, or related fields. Experience with Security Tools: Solid hands-on experience with corporate security tools such as SIEM, EDR, WAF, IDS/IPS, and antivirus solutions. Vulnerability Analysis: Proficiency in using vulnerability scanners such as Nessus, Qualys, or OpenVAS. Infrastructure Knowledge: In-depth understanding of networks, protocols, and operating systems, especially Windows and Linux. Log Analysis: Ability to perform detailed log analysis to identify threats, anomalies, and security incidents. Practical application experience with security methodologies and frameworks, such as ISO 27001.


