Job Description: Starting day June 1st, 2025 onward!
EU visa and work permission mandatory!
We are looking for fresh graduated candidates who have finished university in the academic year 2024 or 2025 to join the Threat and Vulnerability Management team based in Madrid.
Threat and Vulnerability Management is mainly focused on researching, evaluating, tracking, and managing information security threats and vulnerabilities in situations where analysis of well-understood information is required.
Our Requirements:Bachelor's/Master's degree in Cybersecurity, Information Security, Computer Science, or a similar disciplineKnowledge of technical concepts such as cloud computing, networking, application development, and cryptographyFamiliarity with attack and exploitation techniques involving operating systems, applications, and devicesUnderstanding of security best practices for data and systems protectionFamiliarity with vulnerability scanning tools such as Qualys, Nessus, or others is a plusFamiliarity with ticketing tools such as Jira, ServiceNowStrong analytical and problem-solving skillsEffective communication skills to collaborate with cross-functional teamsKnowledge of programming and scripting languages is a plusRelevant certifications, such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or others is a plusResponsibilities:Risk Management: Assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices, and procedures in complex, business-critical environments.
Conduct and document basic information security risk assessments.
Assist in the creation and implementation of security solutions and programs.Regulatory Compliance: Assist in programs to establish, document, and track compliance with industry and government standards and regulations, e.g., ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc.
Assist with research and interpretation of current and pending governmental laws and regulations, industry standards, and customer and vendor contracts to communicate compliance requirements to the business.Threat and Vulnerability Management: Research, evaluate, track, and manage information security threats and vulnerabilities in situations where analysis of well-understood information is required.Incident Management and Response: Respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks.Digital Forensics: Assist with data collection, preservation, and forensic analysis of digital media independently, where a basic understanding of forensic techniques is required.
In a Corporate Security role, assist with the creation, review, and approval of corporate information security policies.
Compile information and reports for management.
#J-18808-Ljbffr