Are you keen on cyber security? Do you want to defend IT infrastructures against cyber threats? If these kinds of challenges intrigue you and you are willing to get involved in a young, dynamic and fast-growing company, then apply below!
Mission
- Detect, identify and analyse vulnerabilities on systems
- Define and implement secure configurations on equipment and systems
- Detect, analyze security incidents, identifying the root cause, threat and impact in a 24×7 context, according to established procedures
- Collect evidence and documentation of actions taken during incident response activities
- Develop and conduct Security Awareness campaigns through the use of market-leading platforms
- Constantly monitor the publication of security bulletins and convey communication according to defined standards
Core Activities
- Carrying out vulnerability scans, analyzing the results, producing customer-specific documentation and reports
- Manage the inventory of assets detected by scanning probes, analyze and justify identified variations
- Monitor and qualify security events from EDR and SIEM solutions, trigger incident response actions according to operational standards and procedures
- Actively contribute to the improvement of operational procedures and documentation
- Collaborate with relevant personnel in the management and communication of incidents in compliance with regulations and frameworks in use
- Constantly review and monitor security bulletins, assessing their impact, criticality and relevance in the context of customers
- Building simulated phishing campaigns using wizards and training content available on specific technology platforms
Required skills
- Know how to practice the technical, functional and operational aspects of managing/responding to a security incident
- Gather, analyze and correlate cyber threat information from various sources
- Work on operating systems, servers, cloud and IT infrastructure
- Work in a challenging environment
- Manage and analyze log files
- Synthesise and communicate adapting to the context and interlocutors
- Collaborate with multidisciplinary teams
Knowledge
- Operating system security
- Network security
- Basic security incident management, IOCs search, event correlation and related reporting
- Basic programming with one of the most common languages (Python, Go, PHP, Bash, etc)
e-Competences (da e-CF)
- 7. Technology Trend Monitoring (Livello 3)
- 2. Component Integration (Livello 2)
- 3. Testing (Livello 2)
- 5. Documentation Production (Livello 3)
- 4. Problem Management (Livello 3)
- 8. Information Security Management (Livello 2)
What do we offer?
- Customized training courses
- Welcome kit with numerous gadgets
- Free coffee
- Meal vouchers
- Healthcare
- Corporate welfare bonuses