VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Home
  • About Us
  • Servicesarrow_drop_down
    • Recruitment
    • Outsourcing
    • Temporary Staffing
    • Consultancy
    • Payroll and Administrative services
  • Career Opportunities
  • Contact Us
  • arrow_drop_down
  • ro
  • en
  • de

Information Security Analyst

ID: Information Security Analyst
Full time
Bucharest
Middle, Senior
06-08-2024
As Security Analysts, we analyse and review reports, logs and various sources of informative data relating to security events. We must be knowledgeable of current security issues and compliance-related information and possess the ability to respond to security issues as needed. In our team, the analyst uses, implements, reviews, or evaluates systems to identify threat actors in their attempts at infiltrating user, customer, or corporate information or jeopardising product infrastructure. The analyst researches and responds to attempted or successful efforts to compromise systems and protocols. The analyst performs and validates vulnerability assessment scans and works with internal teams to resolve potential risks and vulnerabilities. The analyst partners with teams to remediate identified risks and provides reports to management and customers on the impact of breaches or risks to confidentiality, integrity, availability, or disruption to delivery of services.
Responsibilities

What You Will Do: 

  • Vulnerability management monitoring, review and follow-up
  • Supervise current and trending remediation efforts
  • Report to customers on security status of the environment including, trend analysis, remediation efforts, and newly discovered vulnerabilities
  • Frequently document and communicate product security risks, collaborating with internal and external partners
  • Serve as a technical specialist for analysing and identifying security vulnerabilities in web applications, operating systems, and networks
  • Review security events that are populated in a Security Information and Event Management (SIEM) system to develop accurate remediation actions
  • Review, respond, and build alerts
  • Independently follow procedures to contain, analyse, and eradicate malicious activity
  •  Conduct proactive threat research using real-world security data and systems automation
Requirements
  • A college degree or equivalent experience in cyber security
  • Verbal communications skills and concise written communication skills
  • Business savvy and an eye for detail with timely execution
  • Able to deal with high priority, time-sensitive issues
  • Ability to multitask and switch between multiple high priority projects
  • Organisation and multi-tasking skills
  • A solid grasp and experience assessing vulnerabilities and identifying weaknesses in various operating systems, platforms, databases, servers, etc
  • Understanding of the current threat and vulnerability landscape
  • Experience with and understanding of database systems, web servers, application servers, firewalls, routers, load balancers, switches, etc
  • Understanding of Application Security and the OWASP top 10 principles
  • Experience with enterprise endpoint detection tools
  • Dependability: Meet commitments, work independently, accept accountability, be adaptable to change, set personal standards
  • Ability to effectively report trends regular reporting
  • An Understanding of industry standard methodologies in application & operations security
  • Knowledge of emerging threats, mitigations and industry trends
  • Solid grasp of Windows and Linux operating systems

Other Beneficial Qualifications 

  • Demonstrated ability in testing proof of concept exploits to identify potential vulnerabilities • Proficient in scripting(any): Python, Ruby, Pearl, PowerShell
  • Certifications (any): CEH, GCIH, Security+, CCNA Cyber Ops, GWAPT, GPEN, OSCP, OSWE
  • Solid grasp of public cloud infrastructure and architecture (AWS, Azure, GCP) and associated security concepts and challenges
Apply with CV
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
Apply with LinkedIn
  • Similar Jobs
    • Business Analyst
    • Sales Operations Analyst with French and English
    • IT Business Analyst
    • Sales Operations Analyst
    • IT Security Control & Policy Expert
  • Recently Added Jobs
    • Supplier Security Assurance Specialist
    • Software Senior Tester / Test Architect
    • TouchSense Tools SW Engineer
    • SW Engineer – ML framework
    • Automotive Embedded Software Engineer for In-Vehicle Networking and Power Management
  • Recent Articles
    • Our Job Lists Explained: Today, What Does a Product Development Manager Do?
    • Returning to the Office Work: a Vital Imperative or Not?
    • Unlock the Power of Data: The Role of a Database Expert
    • Firmware Engineers: a SF Job in an Enigmatic World?
    • The Hidden Architect – The Layout Engineer
© 2025 - VonConsulting.
  • Terms and Conditions
  • Privacy
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}