LUZA Group

Security Architect

LUZA Group

contract

Posted on:

Location Type: Hybrid

Location: LisboaPortugal

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Design and implement security architectures in hybrid and distributed environments;
  • Define and operationalize security frameworks and best practices in production environments;
  • Develop system architecture projects, including hardening of systems and network software;
  • Perform manual penetration testing and use automated tools (Nmap, Metasploit, Kali Linux, Burp Suite Pro);
  • Support the development of in-house security testing tools;
  • Collaborate with multidisciplinary teams to ensure compliance with security standards;
  • Document security policies, procedures and recommendations.

Requirements

  • Degree in Information Systems, Computer Engineering, Electrical Engineering or a similar field.
  • Minimum of 4 years in the IT/ICT field, with a focus on administration or implementation of security components;
  • Minimum of 3 years in securing hybrid topologies and applying security controls in distributed environments;
  • Minimum of 3 years operationalizing architecture and security frameworks and concepts;
  • Minimum of 3 years in system architecture projects, system hardening and network software;
  • Minimum of 3 years in attack methods, manual penetration testing and hacking tools (Nmap, Metasploit, Kali Linux, Burp Suite Pro);
  • Minimum of 1 year of experience in the Health sector.
Benefits
  • Our company does not sponsor work visas or residence permits for employment purposes. All candidates must have the legal right to work in the country where the vacancy is located.
  • We will only contact candidates who meet the requirements and match the profile sought by our clients.
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
security architecturesystem hardeningnetwork softwaremanual penetration testingsecurity frameworkssecurity controlsattack methodshybrid topologiesdistributed environmentsin-house security testing tools
Soft Skills
collaborationdocumentation