is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
SIEM use cases: log ingestion, analytics rules, playbooks and workbooks. Deploy and manage Microsoft Defender solutions (Defender for Cloud, Defender for Servers, Defender for Containers) to harden Azure workload Vulnerability & Patch Management Operate vulnerability management tools to discover and prioritise flaws across cloud and on-prem systems. Define and run patch management processes for virtual machines, containers and … serverless functions. Integrate vulnerabilityscanning (e.g. Qualys, Sonar Cloud, Tenable or Azure-native scanners) into CI/CD pipelines. Security Analysis & Incident Response Perform root-cause analysis of security incidents and vulnerabilities. Conduct threat modelling, code and infrastructure reviews. Develop and execute incident response procedures, leveraging Sentinel playbooks and Logic Apps when required. CI/CD & Automation Integrate … services (IAM, networking, Key Vault). Proven track record configuring and optimising Microsoft Sentinel (SIEM) and Microsoft Defender tools. Familiarity with Azure Policy and Azure Blueprints for compliance enforcement. Vulnerability & Patch Management Practical experience with vulnerability scanners (Qualys, Tenable, or Azure Defender Vulnerability Assessment). Knowledge of patch management frameworks (WSUS, Azure Update Management, third-party tools More ❯
able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerabilityscanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security More ❯