Cyber Security OT Vulnerability Analyst

Braşov

Freudenberg Group

Freudenberg is a global technology​ group that strengthens customers and society through forward-looking innovations. Learn more about us.

View company page

Apply now Apply later

Working at Freudenberg: We will wow your world!

Responsibilities:

  • Conduct constant vulnerability monitoring and assessments on computer networks, systems, and applications, based on Microsoft Defender for IoT;
  • Analyse scan results and prioritize vulnerabilities based on severity, potential impact, and likelihood of exploitation;
  • Stay updated with the latest security vulnerabilities, exploits, and attack vectors;
  • Develop and maintain the vulnerability management program;
  • Collaborate with system administrators, Process engineers, and the Global IT Security manager to address identified vulnerabilities;
  • Provide guidance and recommendations on security best practices for vulnerability remediation;
  • Track and monitor vulnerability remediation progress, ensuring timely resolution and closure of identified issues;
  • Conduct risk assessments to evaluate the potential impact of vulnerabilities and identify potential threats;
  • Collaborate with the risk management team to prioritize risks and develop effective mitigation strategies;
  • Assist in the development of incident response plans and participate in security incident investigations when necessary;
  • Prepare detailed vulnerability assessment reports, including findings, recommendations, and remediation strategies;
  • Maintain accurate documentation of vulnerabilities, remediation activities, and risk assessment findings;
  • Communicate technical information and security risks to non-technical stakeholders in a clear and concise manner;
  • Stay informed about the latest trends and developments in the field of information security;
  • Conduct security awareness training sessions for employees to educate them about potential vulnerabilities and best practices.

Qualifications:

  • Bachelor's degree in Computer Science, Information Security, or a related field;
  • Strong knowledge of vulnerability assessment methodologies, tools, and best practices;
  • Familiarity with common network protocols, operating systems, and web technologies;
  • Experience with vulnerability scanning tools (e.g., Nessus, MS Defender for IoT) and penetration testing frameworks;
  • Understanding of security frameworks such as OWASP, NIST, or CIS Controls;
  • Knowledge of common security vulnerabilities, exploits, and attack vectors;
  • Strong analytical and problem-solving skills;
  • Excellent written and verbal English communication skills;
  • Ability to work effectively both independently and as part of a team;
  • Relevant certifications (e.g., Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), are desirable.

The Freudenberg Group is an equal opportunity employer that is committed to diversity and inclusion. Employment opportunities are available to all applicants and associates without regard to race, color, religion, creed, gender (including pregnancy, childbirth, breastfeeding, or related medical conditions), gender identity or expression, national origin, ancestry, age, mental or physical disability, genetic information, marital status, familial status, sexual orientation, protected military or veteran status, or any other characteristic protected by applicable law.

Freudenberg Performance Materials SRL
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  5  1  0
Category: Analyst Jobs

Tags: CEH CISSP Computer Science Exploits Incident response IoT Monitoring Nessus NIST OWASP Pentesting Risk assessment Risk management Vulnerabilities Vulnerability management

Perks/benefits: Career development

Region: Europe
Country: Romania

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.