At a Glance
- Tasks: Identify and remediate security weaknesses across applications, networks, and cloud services.
- Company: Join a global semiconductor leader driving innovation at the Intelligent Edge.
- Benefits: Competitive salary, benefits, and continuous professional development opportunities.
- Other info: Collaborative culture that values integrity, innovation, and work-life balance.
- Why this job: Play a vital role in enhancing security for a global enterprise with cutting-edge tools.
- Qualifications: 3-5 years in vulnerability assessment or cloud security; certifications are a plus.
The predicted salary is between 50000 - 65000 ÂŁ per year.
About Analog Devices: Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world.
Role Overview: The Vulnerability Analyst is a key role in protecting our enterprise systems, working to identify, assess, and remediate security weaknesses across applications, networks, cloud services, and core infrastructure. You will combine handsâon vulnerability assessment with broader risk analysis, cloud security insight, and close collaboration across IT, engineering, and security operations teams. We are looking for someone with strong technical depth, clear communication skills, and the ability to turn complex security findings into meaningful business impact.
Key Responsibilities:
- Conduct vulnerability assessments, penetration testing, and security reviews across applications, networks, systems, and cloud platforms.
- Utilise industryâstandard tools such as Tenable, Wiz, and Horizon3 to identify security weaknesses and produce actionable remediation guidance.
- Perform applicationâlayer testing to identify threats such as XSS, SQL injection, buffer overflows, API weaknesses, and emerging exploit categories.
- Analyse cyber defence configurations for compliance with policies, standards, and regulatory requirements.
- Perform qualitative and quantitative risk assessments of existing and proposed technologies, with a strong focus on cloud services.
- Evaluate vendor and SaaS security posture, identify inherent risks, and recommend remediation and lifecycle management strategies.
- Develop and maintain processes for continuous risk monitoring, reporting, and compliance validation.
- Act as a security partner to cloud engineering, IT infrastructure, and application development teams.
- Contribute to the development of secure cloud architecture standards and patterns across Azure, M365, AWS, and other platforms.
- Contribute to the creation, review, and maintenance of corporate security policies, controls, and compliance selfâassessments.
- Produce highâquality written reports tailored to technical and executive audiences, summarising vulnerabilities, risk impact, and recommended remediation strategies.
- Support acquisition integrations from a cloud and infrastructure security perspective.
- Partner with SOC and IR teams to support security investigations, containment, and recovery efforts.
- Document root cause, control gaps, and corrective actions to inform future improvements.
Required Qualifications:
- 3â5+ years of experience in vulnerability assessment, penetration testing, cloud security, or information security engineering.
- Certifications such as CISSP, CISM, CEH, or OSCP are great to have but not essential.
Required Technical Skills:
- Strong handsâon experience with vulnerability management platforms (e.g., Tenable, Wiz, Horizon3).
- Proficiency with penetration testing tools, network analysis utilities, and application security testing methods.
- Solid understanding of cloud architecture and security across Azure, M365, and AWS.
- Familiarity with identity and access management, SSO/OAuth/SAML, and compliance frameworks (ISO, SOC2, CSA).
- Knowledge of Windows and Linux OS internals, networking protocols, and secure configuration practices.
- Ability to analyse and document vulnerabilities, risks, and remediation plans with clarity and precision.
Why Join Us?
- Work with cuttingâedge security tools and technologies in a dynamic, innovative environment.
- Play a meaningful role in shaping and strengthening the security posture of a global enterprise.
- Competitive salary, benefits, and continuous professional development opportunities.
- A collaborative culture that values integrity, innovation, and workâlife balance.
Analog Devices is an equalâopportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.
Offensive Security & Vulnerability Analyst in Edinburgh employer: Analog Devices
Contact Detail:
Analog Devices Recruiting Team
StudySmarter Expert Advice đ¤Ť
We think this is how you could land Offensive Security & Vulnerability Analyst in Edinburgh
â¨Tip Number 1
Network like a pro! Get out there and connect with folks in the industry. Attend meetups, webinars, or even online forums. You never know who might have the inside scoop on job openings or can put in a good word for you.
â¨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your vulnerability assessments or security projects. This gives potential employers a taste of what you can do and sets you apart from the crowd.
â¨Tip Number 3
Prepare for interviews by brushing up on common questions related to vulnerability analysis and cloud security. Practice explaining complex concepts in simple terms, as communication is key in this role.
â¨Tip Number 4
Donât forget to apply through our website! Itâs the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Offensive Security & Vulnerability Analyst in Edinburgh
Some tips for your application đŤĄ
Tailor Your CV: Make sure your CV is tailored to the role of Vulnerability Analyst. Highlight your experience with vulnerability assessments and any relevant tools like Tenable or Wiz. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security and how your analytical skills can contribute to our team. Keep it concise but impactful, and donât forget to mention your problem-solving abilities.
Showcase Your Technical Skills: In your application, be sure to showcase your technical skills clearly. Mention your hands-on experience with penetration testing tools and cloud security. We love seeing candidates who can communicate complex findings in a straightforward way!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. Itâs super easy, and youâll be able to track your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Analog Devices
â¨Know Your Tools
Familiarise yourself with industry-standard tools like Tenable, Wiz, and Horizon3. Be ready to discuss how you've used these tools in past roles, as well as any specific vulnerabilities you've identified and remediated.
â¨Showcase Your Problem-Solving Skills
Prepare to share examples of complex security issues you've tackled. Highlight your analytical thinking and problem-solving abilities by discussing the steps you took to assess and remediate vulnerabilities.
â¨Communicate Clearly
Since the role requires translating technical findings into business impact, practice explaining complex concepts in simple terms. Think about how you would present your findings to both technical and executive audiences.
â¨Stay Updated on Cloud Security
Brush up on your knowledge of cloud architecture and security, especially across platforms like Azure, M365, and AWS. Be prepared to discuss current trends and challenges in cloud security, as well as how you can contribute to secure cloud architecture standards.