Protect and defend: identify, analyze and mitigate threats to IT systems and/or networks.
Use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
Respond to security alerts to mitigate immediate and potential threats. Use mitigation, preparedness, and response and recovery approaches, as needed, to maintain information security and minimize impacts.
Conduct assessments of threats and vulnerabilities; determine deviations from acceptable configurations, enterprise or local policy; assess the level of risk; and develop and/or recommend appropriate mitigation countermeasures.
Operate and maintain: configure, tune, maintain and operate key security controls, technologies, and other risk mitigations.
Application Penetration Test Activity
Security Application
Execute ongoing, operational business-as-usual (BAU) tasks to meet management-defined KPIs and SLAs, and deliver security projects in line with management-defined priorities and deadlines.
Stay current with the latest security news, threats, intelligence, tactics, techniques, and vulnerabilities. Research and analyze new threats and vulnerabilities to determine exposure.
Perform threat hunting and review, triage, investigate and escalate security alerts raised by the Group-Wide SOC team, security tools, technologies, and services (e.g. endpoint security, network security, DLP, SIEM, etc.)
Assist and/or lead efforts to isolate, contain, respond to, and recover from security incidents.
Identify, review, prioritize, plan, coordinate, and follow-up on the remediation of vulnerabilities.
Configure, customize, tune, manage, troubleshoot, and maintain to ensure effective and efficient operation of security technologies, intrusion detection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms.
Define, document, and follow approved processes for all the responsibilities included in this job description. Create and maintain documentation for systems, including design and operation.
Review systems, configurations, and process to ensure and report on compliance with ION policy, client requirements, audit controls, regulations, and industry best practices. Provide best practice security recommendations to IT and other teams within ION, based on review results.
Respond to information security-related inquiries and requests.
Requirements
Master’s degree in computer engineering / computer science or a cybersecurity technology-related field and/or relevant working experience
Must have fundamental programming/scripting capabilities (e.g. python, powershell, bash, etc.)
Must have in-depth understanding of operating systems (Windows/Linux)
Must have understanding of Network and Infrastructure assets
A team player with the ability to work independently and unsupervised
Ability to own delegated tasks and see them through to completion
Ability to manage time and prioritize work to maximize productivity
Excellent communication skills (both written and verbal)
Exceptional attention to detail and quality
Excellent problem-solving techniques and trouble analysis skills
Endpoint security concepts, controls, and best practices for Servers (e.g. Windows and Linux)
General IT networking concepts, protocols, standards and network security concepts, controls, and best practices
Cryptography fundamentals and data security controls and best practices
Benefits
Important Notes
According to the Italian Law (L.68/99) please note that candidates from the disability list will be given priority.
Due to the high volume of applications, only those candidates that meet the required criteria for selection will be contacted.
Please do not apply if you don’t currently have the legal right to work in Italy, or if that right is just about to expire, or if that right has restrictions imposed which would prevent you from undertaking a full-time employment contract.
Senior Security Analyst managing and monitoring security solutions, including firewalls and antivirus. Involves vulnerability analysis, incident response, and compliance with security policies.
Security Analyst enhancing cybersecurity for clients through investigations, awareness programs, and incident response. Join ISA Cybersecurity, a leading firm in Canada with three decades of expertise.
IT Security Analyst protecting identities and data within the Blue Team at Bundesdruckerei. Involved in incident response and security monitoring in a dynamic IT environment.
Analista de Segurança Corporativa responsible for fraud prevention analysis and governance at Central Ailos. The role involves data analysis to mitigate financial fraud risks.
Junior Information Security Analyst at ORAEX consulting focusing on network security and vulnerability assessment. Requires a background in IT and cybersecurity - related studies.
Desktop Support & Security Analyst handling technical support and cybersecurity for the WHOI. Balancing responsibilities between End - User Technology support and Information Security operations while ensuring user functionality.
IT & Security Analyst managing IT operations and security for WEBTOON Entertainment in Los Angeles. Collaborating with global security teams and overseeing user access and security systems.
Information Security Analyst managing critical governance, risk, and compliance topics. Leading incident responses and security policy development in a hybrid work model.
Cyber Security Analyst enhancing cyber resilience for the Swiss financial sector with a focus on threat intelligence. Collaborating closely with partners and regulatory agencies to safeguard against cyber threats.
Information Security Analyst overseeing access management for SKY applications, ensuring security compliance and incident management. Involves technical support and lifecycle management of requests.