Threat Analyst - Risk and Vulnerability and Cybersecurity

0 years

0 Lacs

Posted:1 month ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Role Description

Threats and Controls Assessment

  • Hands-on experience in threat and vulnerability management within large-scale or regulated environments
  • Skilled in analyzing complex architectures, systems, and networks to identify potential security gaps and implement effective controls
  • Proficient in conducting thorough threat and control assessments across internal, external, and cloud environments
  • Experienced in detecting threats across applications, databases, networks, and other IT infrastructure components
  • Risk and Control
  • Proficient in risk and control management practices
  • Ability to evaluate threats, controls, and vulnerabilities, and communicate findings to both technical and business stakeholders
  • Skilled in threat modeling and risk assessment, with the ability to define effective controls to enhance security posture
  • Working knowledge of risk management frameworks and security assessment methodologies
  • Technical Leadership
  • Proven experience working as a technical lead with ownership of process improvements
  • Ability to guide cross-functional teams, ensuring technical excellence and alignment with project goals
  • Stakeholder Management & Soft Skills
  • Experience working in international and diverse environments
  • Strong interpersonal skills for influencing and managing stakeholders
  • Ability to build strong relationships and collaborate effectively within and across teams
  • Excellent communication skills for coordinating with global infrastructure, application, and compliance teams
  • Positive attitude, strong teamwork, flexibility, and a solid understanding of emerging technologies and associated security threats
  • Skilled in preparing reports and presentations for senior management and delivering them to large audiences
  • Tools and Technologies
  • Strong experience in application design and architecture with expertise in network, host, and application security practices
  • Proficient in working with cloud service providers such as AWS, GCP, and Azure
  • Strong understanding of the Software Development Life Cycle (SDLC), with a focus on integrating security at each stage
  • Proven experience in driving continuous improvement and process optimization initiative

Good To Have

  • Prior experience in threat handling across IT infrastructure, including applications, databases, networks, and other components
  • Experience leading continuous improvement initiatives and process optimization
  • Possession of one or more of the following certifications: CISSP, CISA, CISM, or Cloud Security Certifications
  • Familiarity with regulatory security requirements across multiple jurisdictions

Skills

Threat, Risk, Vulnerability

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
UST logo
UST

IT Services and IT Consulting

Aliso Viejo CA

RecommendedJobs for You