Apply now »

We are experiencing a technical issue with the Careers Website. At the moment, applications are not possible. We are working on resolving the issue as soon as possible. Thank you for your patience. 

Vulnerability Management Analyst

Work Your Magic with us!  

 

Ready to explore, break barriers, and discover more? We know you’ve got big plans – so do we! Our colleagues across the globe love innovating with science and technology to enrich people’s lives with our solutions in Healthcare, Life Science, and Electronics. Together, we dream big and are passionate about caring for our rich mix of people, customers, patients, and planet. That's why we are always looking for curious minds that see themselves imagining the unimaginable with us.  

Your role: This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. The main tasks in this role are to analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. You will also prepare reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. Additionally, you will perform technical evaluation of risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).

 

Who you are:

  • Experience in managing and configuring scanning tools (Tenable, Qualys, etc.).
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of application vulnerabilities.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
  • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Skill in using network analysis tools to identify vulnerabilities (e.g., fuzzing, nmap, etc.).
  • Skill in conducting application vulnerability assessments.

 

Salary starts at 2.500 EUR and is dependent upon relevant experience. 

 

What we offer: We are curious minds that come from a broad range of backgrounds, perspectives, and life experiences. We believe that this variety drives excellence and innovation, strengthening our ability to lead in science and technology. We are committed to creating access and opportunities for all to develop and grow at your own pace. Join us in building a culture of inclusion and belonging that impacts millions and empowers everyone to work their magic and champion human progress!

 

Apply now and become a part of a team that is dedicated to Sparking Discovery and Elevating Humanity!

Job Requisition ID:  295878
Location:  Bratislava
Career Level:  C - Professional (1-3 years)
Working time model:  Full-time

North America Disclosure
The Company is committed to accessibility in its workplaces, including during the job application process. Applicants who may require accommodation during the application process should speak with our Candidate Services team at 844-655-6466 from 8:00am to 5:30pm ET Monday through Friday. If you are a resident of a Connecticut or Colorado, you are eligible to receive additional information about the compensation and benefits, which we will provide upon request.  You may contact 855 444 5678 from 8:00am to 5:30pm ET Monday through Friday, for assistance.

Notice on Fraudulent Job Offers
Unfortunately, we are aware of third parties that pretend to represent our company offering unauthorized employment opportunities. If you think a fraudulent source is offering you a job, please have a look at the following information.


Job Segment: Database, SQL, Manager, Technology, Management

Apply now »