The main responsibilities:
1. Actively contributes to the configuration of the detection tool, to the permanent quality assessment of this configuration and of linked processes (coverage, ; in this context, you proactively identify potential gaps and propose remediations when needed
2. Actively contributes to internal control related to the area of activity and takes responsibility for part of the automation.
3. Creates / maintains necessary documentation and procedures.
4. Assists in high-risk vulnerability assessments (in collaboration with the Threat Intelligence team and Risk Management)
5. Supports Vulnerability prioritisation with analysis and assessment of vulnerability and configuration compliance data; identifies high risk vulnerabilities or false positives
6. Assists in findings clarifications for trends in vulnerability scan results, and for (active) threats requiring investigation.
7. Collaborates with Patch Orchestration Team to get insights and assurance on high-risk remediation.
8. Collaborates and exchange relevant information with relevant teams like Threat Intel team, Pentest team, Application Security team or Customer Risk team.
9. Provides on demand information to stakeholders.
In this role, you will be involved in the end‑to‑end process from vulnerability detection to remediation. Within the team, your focus will be on:
10. Participating in the configuration of tools, mainly (but not exclusively) for compliance checks, including the automation of certain CIS baseline assessments; ensuring that operational activities related to these checks are properly documented and executed.
11. Actively contributing to the automation of quality assessment controls using Python scripts.
12. Performing vulnerability and threat assessments, primarily in collaboration with the Cyber Threat Management team and the Pentest team.
13. Acting as a subject matter expert, sharing your knowledge with the team and providing expert advice to the Security Exception Review Board.
The ideal candidate also has strong logical reasoning skills. He/She has experience in control automation and in developing python scripts; the experience in creating Ansible playbooks is a real asset. He/She has a solid understanding of vulnerability management activities (prioritization, .
The candidate is willing to work an average of at least two days per week on‑site at the company’s premises, with the remaining days worked remotely.
Technical skills
14. Good understanding of security practices and risk management
15. Python scripting is a must / Experience with Ansible is a serious plus
16. Knowledge of vulnerability management (exploitability, attack vectors,
On top, following technical skills are a plus
17. Basic understanding of Network security (firewalls, IDS/IPS, load balancers and network access controls that affect vulnerability assessment, routing, network segmentation,…)
18. Hands on experience with vulnerability scanning tool (Rapid7 InsightVM is a plus)
19. Knowledge of MS Defender is considered a plus
20. Any proven Microsoft AZ-500 certification is a plus
21. Unix/Linux and Windows Operating Systems and general security practices (proven experience in these domains is a plus)
22. SQL querying is a plus
23. Experience in auditing is a plus
24. CISSP, GIAC, CEH, COMPTIA or other relevant security certification is a plus
Soft skills
25. Integrity, collective ownership, and curiosity are core values you embody. Your approach to work is guided by a deep respect for your colleagues.
26. Ability to self-reflect and to never consider anything as final or set in stone.
27. Team-player; in this role you will closely work together with the other members of your team. As such an open, respectful and constructive communication is required and willingness to work towards the common team goals as first priority.
28. Analytical; Be able to analyse complex data – identify priority solutions to implement and vulnerabilities to remediate. Gain understanding of threat levels.
29. Pro-activeness, monitor quality of what we deliver and identify improvements where needed, ensure qualitative documentation, be transparent on difficulties you encounter, keep track of your tasks and report pro-actively on status…
30. Customer friendliness is important as you will have interactions with various stakeholders on different levels.
31. Be a good communicator in English, both verbal and written; French or Dutch is a plus
32. Be able to work independently, responsibly and professionally with highly confidential information.
#LI-YK1