Cyber Security Specialist at Fortum
Espoo, , Finland -
Full Time


Start Date

Immediate

Expiry Date

06 Nov, 25

Salary

0.0

Posted On

07 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

Join Our Team as a Cyber Security Specialist! Are you passionate about safeguarding digital landscapes and turning complex technical challenges into actionable insights? Fortum is seeking a dedicated Cyber Security Specialist to strengthen our cyber resiliency and protect our critical ecosystems.
This position is based at our Espoo office. We provide a hybrid work model, allowing employees to combine on-site and remote work.

Responsibilities

Your role as Cyber Security Specialist is to analyze and give prioritize information to our IT stakeholders of vulnerabilities and their importance increasing the cyber resiliency across Fortum ecosystems.

You belong to Cyber Security team, which is responsible for providing various services across the IT (information Technology), OT (Operational Technology) and IAM (Identity & Access management) at Fortum. In more detail, the role as Cyber Security Specialist involves:

  • Translating the technical jargon of vulnerabilities for technical and non-technical persons, service providers
  • Conduct regular vulnerability scans on systems, networks, containers, and applications using industry-standard tools (Rapid7, Microsoft Defender, etc.).
  • Identifying and collect vulnerability information from other sources like national cyber security center, CISA and other advisories
  • Analyses scan results to validate vulnerabilities, eliminate false positives, and assess severity and potential impact.
  • Prioritize vulnerabilities based on criticality, asset classification, exploitability, and business risk.
  • Collaborate with SOC, system owners and technical teams to drive timely remediation or mitigation efforts.
  • Provide guidance and awareness to teams about secure configuration, patching best practices, and reducing attack surfaces
  • Track and report on vulnerability lifecycle metrics, KPIs, and remediation SLAs.
Loading...