···
Log in / Register
Information Security Analyst pl (1)
Negotiable Salary
Indeed
Full-time
Onsite
No experience limit
No degree limit
R. Joaquim Mendes de Oliveira, 103 - Vila Santo Antonio, São José do Rio Preto - SP, 15014-310, Brazil
Favourites
Share
Some content was automatically translatedView Original
Description

Description: To participate in our process, you must have: * Education: Completed Higher Education (Degree in IT, Networks, Systems Engineering, Information Security, or related fields); * Practical experience with Red Team, vulnerability testing and analysis. * Knowledge of Vulnerability Management and Threat Intelligence tools. * Experience in incident response. * Ability to produce technical documentation and manage incidents. * Knowledge of Infrastructure, Operating Systems, Networks, Databases, and Cloud. * Knowledge and experience using tools focused on executing controlled attacks and identifying malicious artifacts, with emphasis on vulnerability validation, threat analysis, and incident response. * Skills in identifying vulnerabilities and recommending fixes or security best practices for web applications, APIs, and other software components. On a day-to-day basis, you will: * Monitor and respond to incidents from the Threat Intelligence tool. * Perform takedowns of malicious or fraudulent websites and profiles. * Support the team in responding to cyber incidents. * Manage and track vulnerability remediations. * Support technical teams in fixing vulnerabilities. * Administer and manage Vulnerability Management tools and Kali Linux: * Register and document incidents; * Conduct physical and logical pentests with attack surface analysis. * Monitor and validate fixes for vulnerabilities identified during pentests. * Participate in security projects and continuous improvement initiatives. * Support the cyber defense team with information on attack architectures to enhance environmental defenses; * Execute exploitation tests to practically validate identified vulnerabilities, assessing actual impact and potential attack vectors; * Perform detection and analysis of malicious artifacts, focusing on identifying suspicious behaviors, indicators of compromise, and persistent threats; * Provide occasional support on security practices within the software development lifecycle in DevOps pipelines and code reviews for vulnerability identification and security improvements. 2510110202241802088

Source:  indeed View original post
João Silva
Indeed · HR

Company

Indeed
Cookie
Cookie Settings
Our Apps
Download
Download on the
APP Store
Download
Get it on
Google Play
© 2025 Servanan International Pte. Ltd.