Why choose Logicalis?
As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.
We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.
Function Description:
• Designs, develops, implements and troubleshoots various information system (IS) and cyber security software
• Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems
• Evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation
• Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities
Career Type Description:
• Designs, develops, implements and troubleshoots various information system (IS) and cyber security software
• Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems
• Evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation
• Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities
Profile Description:
• Has working knowledge and experience in own discipline
• Continues to build knowledge of the organization, processes and customers
• Performs a range of mainly straightforward assignments
• Uses prescribed guidelines or policies to analyze and resolve problems
• Receives a moderate level of guidance and direction
•• Has limited work experience involving basic concepts and procedures
•• Develops competence by performing structured work assignments
•• Uses existing procedures to solve routine or standard problems
•• Works under supervision and direction from more senior level roles
Career: IT Security-Cyber Security
Career Type: Professional
Job Type: Analyst
Level: P09
If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.