General information

Pays
Philippines
Ville
Site éloigné
Identifiant du poste
44175
Department
Information Technology
Expériences
MID_SENIOR_LEVEL
Employment Status
FULL_TIME
Workplace Type
Hybrid

Description & Requirements

The Security Analyst will be part of the Vulnerability Management team, which is currently expanding and transitioning into a service offering for the entire Infor company. This role will collaborate closely with other segments of the Security organization to drive the evolution of cyber defenses within the company, challenge the status quo, leverage a diverse IT background, and employ a comprehensive knowledge to identify, assess, prioritize, and communicate vulnerabilities and threats across the organization.

What You Will Need?
Required skills:
  • Operational experience in various vulnerability scanning applications (e.g., Qualys or similar solutions), vulnerability management, or related information security fields.
  • Knowledgeable in NIST and ISO 27001 frameworks.
  • Familiarity with industry-standard security best practices and vulnerability management processes, including compliance reporting.
  • Knowledge of general cloud concepts, particularly in AWS environment and system security controls on multiple operating systems.
  • Knowledge of operating system hardening and CIS benchmark
  • Knowledge of Microsoft platform, Open System platform, Virtualization platforms and Databases, and patch management
  • Knowledge of networking concepts and devices (Firewalls, Routers, Switches, and Load Balancers) and good understanding of network and web-related protocols
  • Strong communication skills
  • Availability to work in the Philippines in GMT or GMT+1 time zones.

What Will Put You Ahead?
Preferred Qualifications:
  • Experience in automation using programming languages such as Java and Python.
  • Knowledge of Secure Software Development Life Cycle (SSDLC) 
  • Demonstrates principled entrepreneurship, practicing mutual benefit, and possessing the ability to attract, motivate, and empower people.
  • Proven ability to challenge the status quo
  • Values collaboration as a key aspect of success, with the capability to interact effectively with employees at all levels, both personally and professionally. Displays personal and professional self-awareness, recognizing strengths and areas for development, and actively seeks opportunities for growth.
  • Exhibits a commitment to lifelong learning and self-actualization, continuously seeking out new knowledge and skills to stay ahead in the field of cybersecurity.
  • Demonstrates flexibility and organizational skills, adapting to changing environments and effectively managing multiple tasks and responsibilities.
  • Possesses a passion for advanced cybersecurity

A Day in The Life Typically Includes:
  • Research and report vulnerabilities using various tools in software, firmware, and devices, and modern exploits and exploitation techniques in the following areas: Microsoft platform, Open Systems platforms, Java, Adobe, Web Application, Java web app virtualization platforms, Networking, Databases, and others.
  • Assess publicly and privately announced security vulnerabilities to determine the risk based on severity, threat likelihood, and impact.
  • Produce data-driven, meaningful dashboards and reporting that show Security Risk 
  • Constantly transform yourself and the organization by designing correction plans and security findings into avoidance programs.
  • Create mutual benefit by collaborating with Infrastructure, Application and Development leads on security findings and data-storytelling using your data analytics skills.
  • Read through system configuration reports and provide systems security hardening practices
  • Automate manual activities and processes with automation where possible to avoid repeating human intervention and create efficiency and convenience.
  • Respond on Cyber Threat by analyzing the source, scope, and the impact to protect systems and data.
  • Suggest improvements and recommendations based on the analyses you do, using various tools and techniques and advise on training, awareness, best practices and policies/procedures to ensure an affective security program.
  • Identify and recommend appropriate measures to manage and remediate vulnerabilities and reduce potential impacts on information resources to a level acceptable to the senior management of the company.

À propos d’Infor

Infor est un leader mondial des produits logiciels cloud d’entreprise pour les entreprises de marchés sectoriels. Infor crée des suites industrielles complètes dans le cloud et déploie efficacement une technologie qui place l’expérience utilisateur au premier plan, exploite la science des données et s’intègre facilement dans les systèmes existants. Plus de 60 000 entreprises dans le monde font confiance à Infor pour surmonter les perturbations du marché et réaliser une transformation numérique à l’échelle de l’entreprise. 
Pour plus d’informations, visitez www.infor.com

Nos valeurs

Chez Infor, nous visons un environnement fondé sur une philosophie d’entreprise appelée Principle Based Management™ (PBM™) et huit principes directeurs : intégrité, gérance & conformité, transformation, entrepreneuriat fondé sur des principes, connaissance, humilité, respect, réalisation de soi. L’augmentation de la diversité est importante pour refléter nos marchés, nos clients, nos partenaires et les communautés que nous servons aujourd’hui et à l’avenir.

Nous avons un engagement sans relâche envers une culture basée sur PBM. Informé par les principes qui permettent à une société libre et ouverte de s’épanouir, PBM™ prépare les individus à innover, à s’améliorer et à se transformer tout en favorisant une organisation saine et en croissance qui crée de la valeur à long terme pour ses clients et ses partisans et l’épanouissement de ses employés.

Infor souscrit au principe de l’égalité des chances. Nous nous engageons à créer un environnement de travail diversifié et inclusif. Infor ne discrimine pas les candidats ou les employés en raison de leur sexe, de leur race, de leur identité de genre, de leur handicap, de leur âge, de leur orientation sexuelle, de leur religion, de leur origine nationale, de leur statut d’ancien combattant ou de tout autre statut protégé par la loi.

Chez Infor, nous respectons votre vie privée, c’est pourquoi nous avons créé une politique que vous pouvez lire ici.