IT Security Expert PDPQ

Częstochowa, WP, PL, 42-200

ZF Friedrichshafen AG

ZF is a global technology company and supplies systems for passenger cars, commercial vehicles and industrial technology.

View company page

Req ID 67185 Częstochowa, Poland


ZF is a global technology company suppling systems for passenger cars, commercial vehicles and industrial technology, enabling the next generation of mobility. ZF allows vehicles to see, think and act. In the four technology domains of Vehicle Motion Control, Integrated Safety, Automated Driving, and Electric Mobility, ZF offers comprehensive product and software solutions for established vehicle manufacturers and newly emerging transport and mobility service providers. ZF electrifies a wide range of vehicle types. With its products, the company contributes to reducing emissions, protecting the climate and enhancing safe mobility. In fiscal year 2020 ZF reported sales of €32.6 billion.

The company employs more than 150,000 associates at approximately 270 locations in 42 countries.


Your Role: 

  • Provide cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities and attacks. 
  • Assist in the evaluation, development, testing and implementation of emerging data access control technologies, information systems security issues, safeguards and techniques. 
  • Recommend mitigation Tactics Techniques and Procedures (TTPs) for identified malicious logic within the customer's environment. 
  • Maintain current knowledge of tools and best-practices in advanced persistent threats. 
  • Regularly developing and producing succinct written intelligence reports constructed from technical analysis and collected threat information for CTI internal consumers. 
  • Partnering with peer cyber operations teams to understand events and support technical analysis of malicious cyber security incidents. 
  • Tracking potential threats associated with attempted intrusions, network & host-based attacks. 

Your profile: 

  • Good communicator, with a positive attitude, looking to share your passion and knowledge in the team. 
  • Perfect management of assigned priorities and great autonomy in your work 
  • Bachelor's and Master's Degree in Computer Science, Intelligence, Education, Computer Engineering, Cyber Security, Technical, Engineering, Technology, Information Security, International Relations 
  • Solid knowledge of the various vulnerability types, their root cause, exploitation techniques and mitigation patterns. 
  • Hands-on experience in web vulnerabilities finding and exploitation. 
  • Hands-on experience in application security testing software and common penetration testing tools (Kali Linux, Burp Suite, ShiftLeft). 
  • Good knowledge of IT technologies (network protocols, Web, clouds, operating systems, database systems). 
  • Good written and spoken in English 


Nice to have: 

  • Relevant industry security certifications (CEH, CISSP, SANS, GCTI, GIAC, GSEC, GCIH, CISA, CSSP, CREST) 
  • Knowledge of IT security standards and frameworks (ISO, NIST, DevSecOps etc.) 


We offer: 


  • Working in a multidimensional environment with various stakeholders involved
  • Exposure to modern IT technologies
  • Private medical care, MyBenefit platform, discounts package on goods and services
  • Flexible working hours and very good working environment



Be part of our ZF team as IT Security Expert PDPQ and apply now!


Sergii Polishchuk

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security Burp Suite CEH CISA CISSP Cloud Computer Science CREST DevSecOps GCIH GCTI GIAC GSEC Industrial Kali Linux Monitoring NIST Pentesting SANS TTPs Vulnerabilities

Perks/benefits: Flex hours Team events

Region: Europe
Country: Poland
Job stats:  7  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.