Banking Sector | Pentester Senior

Porto, Portugal


Stay ahead with Devoteam's IT consultants. We offer digital strategy, cloud platforms, cybersecurity expertise & more for your digital innovation vision.

View company page

Company Description

At Devoteam, we believe that technology with strong human values can actively drive change for the better. Discover how Tech for People unlocks the future, creating a positive impact on the people and the world around us. We are a global leading player in Digital Transformation for leading organisations across EMEA, with a revenue of €1B. We believe in transforming technology to create value for our clients, partners and employees in a world where technology is developed for people. We are proud of the culture we have built together. We are proud of our people at the service of technology. We are proud of our diverse environment. Because we are #TechforPeople. Join our multidisciplinary team of Cloud experts, Designers, Business consultants, Security experts, Engineers, Developers and other extraordinary talents, spread across more than 20 EMEA countries. Become one of our +10.000 tech and business leaders on cloud, data and cyber security. Let’s fuse creativity with technology together and build innovative solutions that actively change things for the better.

Job Description

We are looking for a Pentester to join the Purple team within our Infrastructure, Production & Security business unit.

The candidate will have four main duties:

 1. Analyst

Develop new logs analysis and correlation rules and maintain existing rules and different components of the SIEM alerting GUI (Dashboard, Alerting, etc.)

  • Create the search algorithm;

  • Investigation and statistics analysis;

  • First-level diagnoses of the malicious codes (Sandbox or manually);

  • Understand new vulnerabilities and their exploitations, advise and follow the remediation with the concerned IT team;

  • Understand how new cyberattacks can target Natixis IS;

  • Find relevant IOC sources to feed security monitoring tools;

  • Create or find patterns to anticipate and detect new attacks;


 2. BlueTeam

  • Test and improve detection alerts and security tools during penetration tests

  • Advise and help IT on cyber security investigations;


3. Training

  • Self-training to rise in expertise:

  • Exploitation of new vulnerabilities.

  • Methods and tools (survey, training, international conferences, …)


4. RedTeam

  • Carry out security assessments on the organization's IT infrastructure and web applications.

  • Deliver and present a report of the findings.



  • Conduct penetration testing on the company's IT systems

  • Identify vulnerabilities and weaknesses in the systems

  • Provide recommendations for improving system security

  • Create detailed reports on tests performed

  • Present results of tests performed to a technical or non-technical audience

  • Participate in training team members on the latest trends in computer security

  • Work closely with members of the Blue Team to coordinate security activities

  • Participate in simulated attack exercises to test the response capabilities of the Blue Team

Additional Information

Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.


Does this sound like you?

Come build with us, innovative solutions that actively change things for the better.

Apply today!

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Banking Blue team Cloud IT infrastructure Monitoring Pentesting Security assessment SIEM Vulnerabilities

Perks/benefits: Conferences

Region: Europe
Country: Portugal
Job stats:  14  4  1

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.