




Description: To participate in our process, you must have: * Education: Completed Higher Education (Degree in IT, Networks, Systems Engineering, Information Security, or related fields); * Practical experience with Red Team, vulnerability testing and analysis. * Knowledge of Vulnerability Management and Threat Intelligence tools. * Experience in incident response. * Ability to produce technical documentation and manage incidents. * Knowledge of Infrastructure, Operating Systems, Networks, Databases, and Cloud. * Knowledge and experience using tools focused on executing controlled attacks and identifying malicious artifacts, with emphasis on vulnerability validation, threat analysis, and incident response. * Skills in identifying vulnerabilities and recommending fixes or security best practices for web applications, APIs, and other software components. On a day-to-day basis, you will: * Monitor and respond to incidents from the Threat Intelligence tool. * Perform takedowns of malicious or fraudulent websites and profiles. * Support the team in responding to cyber incidents. * Manage and track vulnerability remediations. * Support technical teams in fixing vulnerabilities. * Administer and manage Vulnerability Management tools and Kali Linux: * Register and document incidents; * Conduct physical and logical pentests with attack surface analysis. * Monitor and validate fixes for vulnerabilities identified during pentests. * Participate in security projects and continuous improvement initiatives. * Support the cyber defense team with information on attack architectures to enhance environmental defenses; * Execute exploitation tests to practically validate identified vulnerabilities, assessing actual impact and potential attack vectors; * Perform detection and analysis of malicious artifacts, focusing on identifying suspicious behaviors, indicators of compromise, and persistent threats; * Provide occasional support on security practices within the software development lifecycle in DevOps pipelines and code reviews for vulnerability identification and security improvements. 2510110202241802088


