Qureos

Find The RightJob.

Senior Cybersecurity Defence Analyst

The role is responsible for using data collected from cyber defence tools to analyse events that occur within flyadeal to detect and mitigate cyber threats, performing vulnerability & risk assessments of systems and networks, identifying where they deviate from acceptable configurations or applicable policies, measuring effectiveness of defence-in-depth architecture against known vulnerabilities, and executing cybersecurity compliance and risk assessment on F3 new systems/service in multiple phases of the project.



Key Responsibilitie

  • sAnalyse organization's cybersecurity defence policies and configurations to evaluate compliance with regulations and organizational directives
  • .Correlate incident data to identify vulnerabilities
  • .Carry out vulnerability scanning on systems and assets and recommend corrections for the environment
  • .Use cybersecurity products and security control technologies to reduce identified risk to an acceptable level
  • .Maintain a deployable cyber defence audit toolkit based on industry best practice to support cyber defence audits
  • .Escalate incidents that may cause immediate or ongoing impact
  • .Analyse and report on trends in the organization's security posture, systems' security posture and cyber defence trends
  • .Correlate information from multiple sources to understand situation and determine the effectiveness of an observed attack
  • .Perform cybersecurity reviews and identify security gaps in security architecture to inform risk mitigation strategies
  • .Conduct authorized attempts to penetrate computer systems or networks and physical premises, using realistic threat techniques, to evaluate their security and detect potential vulnerabilities
  • .Prepare cybersecurity assessment and audit reports that identify technical and procedural findings and include recommended remediation strategies and solutions
  • .Identify indications and warnings through research, analysis, and correlation across multiple data sets
  • .Assist in the construction of signatures for implementation on cybersecurity network tools to respond to new or observed threats within the environment
  • .Provide summary reports of network events and other cybersecurity-relevant activities in line with organizational policies and requirements
  • .Recommend cost-effective security controls to mitigate risks identified through testing and review
  • .Use security testing and code scanning tools to conduct code reviews


.

© 2026 Qureos. All rights reserved.