Add expected salary to your profile for insights
#WeAreIn for driving decarbonization and digitalization.
As a global leader in semiconductor solutions in power systems and IoT, Infineon enables game-changing solutions for green and efficient energy, clean and safe mobility, as well as smart and secure IoT. Together, we drive innovation and customer success, while caring for our people and empowering them to reach ambitious goals. Be a part of making life easier, safer and greener.
Are you in?
We are on a journey to create the best Infineon for everyone.
This means we embrace diversity and inclusion and welcome everyone for who they are. At Infineon, we offer a working environment characterized by trust, openness, respect and tolerance and are committed to giving all applicants and employees equal opportunities. We base our recruiting decisions on the applicant's experience and skills.
Please let your recruiter know if they need to pay special attention to something in order to enable your participation in the interview process.
Job Description
In your new role you will:
- Responsible for the vulnerability assessment and analysis, including
- Conduct comprehensive vulnerability assessments on applications, infrastructure, and networks.
- Analyze vulnerabilities to understand exploitability, attack vectors, and potential risks.
- Perform manual validation and verification of findings to reduce false positives.
- Work with internal teams to ensure timely patching and remediation of identified security weaknesses.
- Handle threats & risk severity analysis, including
- Evaluate vulnerabilities based on severity, impact, and real-world exploitability.
- Assess risks in the context of business operations and critical asset protection.
- Stay updated on the latest threat intelligence, CVEs, and emerging attack techniques.
- Assist in developing mitigation strategies for critical vulnerabilities.
- Accountable for the prioritization & remediation support, including
- Work closely with various security and infrastructure teams to prioritize vulnerabilities based on risk levels.
- Provide actionable recommendations to reduce exposure and improve security posture.
- Assist in coordinating patch management efforts and alternative mitigation approaches.
- Support compliance with industry security frameworks.
- Handle vulnerability reporting and documentation, including
- Develop detailed vulnerability reports, including root cause analysis and remediation plans.
- Create dashboards and metrics to track vulnerability trends and remediation progress.
- Maintain accurate documentation of security assessments, findings, and corrective actions.
- Present findings to stakeholders and leadership in a clear and structured manner.
- Involve in Red Team & Penetration Testing Support (Preferred)
- Utilize penetration testing techniques to validate and exploit vulnerabilities where applicable.
- Collaborate with Red Team members to simulate real-world attack scenarios.
- Understand and communicate how vulnerabilities can be exploited to better inform remediation strategies.
- Support security testing initiatives, such as internal/external penetration tests.
Your Profile
You are best equipped for this task if you have:
- Bachelor's or Master's degree in Cybersecurity, Information Security, Computer Science, or a related field.
- Hands-on experience in vulnerability assessments, threat analysis, and risk evaluation.
- Strong understanding of common vulnerabilities, attack vectors, and exploitation techniques.
- Familiarity with vulnerability scanning tools.
- Knowledge of patch management, security hardening, and remediation processes.
- Strong analytical skills for risk prioritization and mitigation planning.
- Ability to communicate security risks and remediation strategies effectively.
- Experience with security frameworks such as MITRE ATT&CK, OWASP Top10, and NIST CSF.
- Experience with Vulnerability Assessment & Analysis is preferred.
- Experience with penetration testing or Red Team techniques is an added advantage.
- Familiarity with exploit development and ethical hacking methodologies.
- Basic understanding of secure coding practices and application security.
- Certifications in the area of Cyber Security are a plus.
How do your skills match this job?
Sign in and update your profile to get insights.
Consumer Electronics Manufacturing More than 10,000 employees