Security Analyst
What makes you a great fit:
- Solid understanding of networking fundamentals (HTTP/S, TCP/IP, DNS, routing, etc.)
- Strong knowledge of cybersecurity principles, including vulnerabilities and exploits
- Experience or familiarity with developing and validating network-based signatures
- Experience in coding — Python
- Experience with code repositories (Git, BitBucket)
- Experience with Docker technology — advantage
- Hands-on experience with penetration and scanning tools like Metasploit, Nuclei and Nmap — advantage
- Strong problem-solving skills and keen attention to detail
- Ability to analyze complex network data and identify anomalies
- Upper-intermediate level of English
Why work with us? - People-oriented management without bureaucracy
- The friendly climate inside the company is confirmed by the frequent comeback of previous employees
- Flexible working schedule
- 29 paid time off (18 working days per year, plus 11 days — all national holidays)
- 10 sick leave days
- Full financial and legal support for private entrepreneurs
- Free English classes with native speakers or with Ukrainian teachers (for your choice)
- Dedicated HR
Your day-to-day in this position: - Network Analysis: Conduct thorough research of network-based vulnerability traffic
- Development & Validation: Develop, write, review, and validate signatures and templates used for scanning systems for security weaknesses
- Security Assessments: Assist in performing vulnerability assessments and penetration testing to support ongoing security initiatives
- Collaboration & Reporting: Work closely with team members to document findings, prepare detailed reports, and recommend actionable remediation steps
Continuous Learning: Stay updated on the latest cybersecurity trends, threats, vulnerabilities, and best practices
What makes this project exciting:Are you ready to join an innovative force in cybersecurity backed by one of the industry’s biggest names? Our client, recently acquired by Check Point for $200 million, is on a mission to transform external risk management. Imagine being part of a team that uses cutting-edge technology to protect businesses from the most dangerous cyber threats out there — monitoring the dark web, pinpointing vulnerabilities, and preventing data breaches.
This is more than just a job; it’s an opportunity to make a real impact in the world of cybersecurity. The pace is fast, the challenges are thrilling, and the solutions are AI-driven, putting you at the forefront of real-time threat detection. What’s more, with the support of a global powerhouse like Check Point, you’ll have the stability, resources, and career growth opportunities that only come with being part of a leader in the cybersecurity field!
Our next steps:
✅ Intro call with a Recruiter — ✅ Client intro interview — ✅ Home assignment — ✅ Tech interview — ✅ HR client interview — ✅Reference check — ✅ Offer