Vulnerability Intelligence Analyst

Posted 3 Days Ago
Be an Early Applicant
Katowice, Śląskie
Junior
Cloud • Hardware • Internet of Things • Software • Business Intelligence
The Role
As a Vulnerability Intelligence Analyst, you will conduct vulnerability assessments, gather and analyze intelligence, prepare reports, collaborate on threat mitigation, manage scanning tools, and ensure compliance with industry standards. You will support stakeholders by proactively identifying vulnerabilities and providing actionable insights.
Summary Generated by Built In

We are looking for you, if you have:

  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field, relevant certifications

  • Minimum of 1 year of experience in vulnerability management, threat intelligence, or a related field,

  • Analytical and problem-solving skills, ability to interpret complex data and provide actionable insights,

  • Proven ability to work collaboratively in a team-oriented environment.

  • English-C1/B2

 

You'll get extra points for:

  • Master’s degree in Cybersecurity , computer science or comparable degree,

  • Cyber Security certification (like: CISSP, CySA+, CEH)

  • IT related certification (like: RHCSA, MCSA, CCNA)

  • 3 years’ experience in a similar role,

  • Experience in usage and configuring cyber threat intelligence tools,

  • Proficiency with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7), strong understanding of network protocols, operating systems, and security frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain, NIST

  • Experience in cloud provisioning, knowledge of Infrastructure as Code

  • International work experience with strong network within international security initiatives.

Your responsibilities:

  • Vulnerability Assessment: Conduct regular vulnerability assessments using industry-standard tools and methodologies to identify security weaknesses in our systems, applications, and networks.

  • Intelligence Gathering: Monitor and collect vulnerability intelligence from diverse sources, including security advisories, threat feeds, open-source intelligence (OSINT), and dark web forums.

  • Analysis and Reporting: Analyze vulnerability data to determine the potential impact on the organization. Prepare detailed reports and risk assessments for key stakeholders, highlighting critical vulnerabilities and recommended remediation steps.

  • Threat Mitigation: Collaborate with the Incident Response, IT, and Development teams to prioritize and address identified vulnerabilities. Provide guidance on best practices for vulnerability mitigation and security hardening.

  • Threat Modeling: Develop and maintain threat models to anticipate potential attack vectors and identify vulnerabilities in new and existing systems.

  • Tool Management: Manage and maintain vulnerability scanning tools and platforms. Ensure tools are updated with the latest signatures and configurations to provide accurate and comprehensive assessments.

  • Continuous Improvement: Stay current with the latest vulnerability trends, attack vectors, and security technologies.

  • Compliance: Ensure all vulnerability management activities comply with relevant industry standards, regulations, and internal policies.

Information about the squad:

Global Threat Management

The key mission of GTM is to enable stakeholders to be a step ahead in an ever-changing world by delivering outstanding intelligence products and services. The team proactively identifies threats, illuminates complex topics and provides actionable recommendations to stakeholders. By combining people from various background the team ensures a thorough understanding of all levels of the threat landscape providing a depth and breadth coverage of relevant threats and events.

Top Skills

Nessus
Qualys
Rapid7
The Company
HQ: Round Rock, TX
141,260 Employees
On-site Workplace
Year Founded: 1984

What We Do

Technology drives human progress. This tenet is the core of our business and vision. Our customers and team members are integral to our continuing success as we provide the essential infrastructure for organizations to transform their digital futures.

Similar Jobs

ING Logo ING

Vulnerability Intelligence Analyst

Fintech • Payments • Financial Services
Katowice, Śląskie, POL
65710 Employees

Caterpillar Logo Caterpillar

Business Process Specialist - Supply Chain and Procurement

Artificial Intelligence • Cloud • Internet of Things • Software • Cybersecurity • Industrial
Hybrid
Sosnowiec, Śląskie, POL
100000 Employees

Dell Logo Dell

Penetration Tester

Cloud • Hardware • Internet of Things • Software • Business Intelligence
Katowice, Śląskie, POL
141260 Employees

Dell Logo Dell

Fraud Alert Specialist

Cloud • Hardware • Internet of Things • Software • Business Intelligence
Katowice, Śląskie, POL
141260 Employees

Similar Companies Hiring

Stepful Thumbnail
Software • Healthtech • Edtech • Artificial Intelligence
New York, New York
60 Employees
HERE Technologies Thumbnail
Software • Logistics • Internet of Things • Information Technology • Computer Vision • Automotive • Artificial Intelligence
Amsterdam, NL
6000 Employees
True Anomaly Thumbnail
Software • Machine Learning • Hardware • Defense • Artificial Intelligence • Aerospace
Colorado Springs, CO
131 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account