Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Mentionedyears
Not Disclosed
Salary Not Disclosed
Any Nationality
N/A
1 Vacancy
As a cybersecurity professional, you will play a vital role in designing secure systems, implementing security protocols, and providing technical support for cybersecurity incidents. Your responsibilities will span several key areas, including vulnerability scanning, security operations support, and the implementation of security measures.
Vulnerability Scanning and Assessment
One of your primary duties will involve conducting vulnerability scans across various systems and assets to identify potential security risks. You will assist in authorized penetration testing under supervision, contributing to a comprehensive assessment of the organization’s security posture. Supporting the analysis of vulnerability data is essential, as you will help identify critical cybersecurity issues that need addressing.
Security Operations Support
In this role, you will monitor system performance and integrity to detect potential security threats and vulnerabilities proactively. Your support for security operations will include basic incident response tasks, where you will assist in managing and mitigating security incidents. Additionally, you will gather audit evidence and documentation to ensure compliance with regulatory requirements. Documenting configurations, policies, and processes is crucial for maintaining knowledge transfer within the security team, fostering a collaborative and informed environment.
Implementation of Security Measures
You will assist in the development of security plans designed to protect the organization’s information assets. Supporting the implementation of security measures and controls as directed by senior team members will be a key aspect of your responsibilities. This collaborative approach will help enhance the overall security framework of the organization.
Requirements for the Role
Technical Expertise
You should possess proficiency in conducting vulnerability scans using established tools and techniques. Knowledge and experience in supporting penetration testing activities under supervision are also essential. Familiarity with intrusion detection technologies and security monitoring tools will aid your support of security operations. Furthermore, the ability to document and report on security vulnerabilities and risks is critical for effective communication within the team.
Cybersecurity Knowledge
A foundational understanding of basic cybersecurity principles, common attack vectors, and threat actors is necessary. Knowledge of risk assessment and mitigation methods, along with basic familiarity with vulnerability management processes and tools, will enhance your effectiveness in this role.
Analytical Skills
Strong problem-solving abilities will enable you to assist in analyzing vulnerability data and identifying security issues. Attention to detail is vital when conducting scans and documenting findings, ensuring that no risks are overlooked.
Communication Skills
You must be able to communicate your findings clearly and concisely to both technical and non-technical audiences. Effective teamwork is essential, as you will need to collaborate closely with senior team members and follow their guidance.
Education and Experience
A diploma or bachelor’s degree in a relevant field, such as Cybersecurity or Information Technology, is preferred. Relevant industry certifications, such as CompTIA Security+ or CEH, are advantageous. The role requires a minimum of 3-4 years of experience, including at least 1-2 years of hands-on experience in vulnerability management or a related cybersecurity discipline. Proficiency in vulnerability scanning tools and basic scripting or coding abilities will further enhance your qualifications.
Full-time