Security Analyst
Veho
IT
Bogotá, Bogota, Colombia
About Veho
- Analyze network traffic, intrusion attempts, activity logs, and system alerts for trends, anomalies, and potential security breaches. Perform initial triage and analysis to identify and classify the type and severity of security events.
- Conduct or coordinate vulnerability scans, and penetration tests to expose known and undocumented vulnerabilities in various information systems, document findings, and recommend risk mitigation strategies.
- Execute basic incident response protocols, including containment, eradication, and recovery steps as per established playbooks.
- Contribute to security compliance efforts such as ISO27001 certification, privacy and data security law compliance by providing the necessary capabilities and artifacts.
- Assist with conducting risk assessments and developing risk mitigation strategies including working with development teams to integrate risk management practices into the software development lifecycle.
- Review Security Researcher findings through the company’s Vulnerability Disclosure program and pursue remediation when issues are validated.
- Maintain up-to-date knowledge of emerging threats and attack vectors
- 1-5 years experience
- Bachelor's degree in computer science, information security, or a related field, or relevant work experience in lieu of a degree.
- Log analysis and familiarity with security information and event management (SIEM) systems
- Networking and web-related protocols (e.g. TCP/IP, DNS, TLS, IPSEC, HTTP, HTTPS, routing protocols)
- Incident response procedures and best practices
- Common attack patterns and exploitation techniques
- Web application security, secure coding practices, and OWASP Top 10
- Security analysis techniques such as threat modeling and attack graphs
- GitHub operations (e.g., cloning, branching, merging, pull requests, issues)
- Common software development practices and procedures (version control, testing, patching, CI/CD)
- Cloud infrastructure (AWS, Google Cloud, Azure) along with best practices and security features
- Security tools such as endpoint detection and response (EDR) and vulnerability scanners
- Security frameworks such as ISO27001
- Security certifications (CISSP, GCIA, GCIH, GCFA, GCFE, etc.)
- Ability to prioritize multiple tasks/initiatives at once and adjust on the fly
- Comfortable with ambiguity and enjoy providing structure to solve problems
- Self-motivated and comfortable in a remote environment
- Experience with security automation
- Experience in scripting (Bash, Python, etc.)