招聘

Senior Cyber Analyst - Threat Exposure Management (AppSec and AI)
Portugal, Lisbon, 1500-180
·
On-site
·
Full-time
·
1w ago
Required Skills
Threat Exposure Management
Vulnerability Management
Defensive Security
Offensive Security
Exploitability Assessment
Identity Security
Active Directory
Entra ID
Kerberos
PKI
Cloud Security
Azure
AWS
GCP
Data Analysis
Risk Assessment
We are looking for a Senior Cyber Analyst specialising in Threat Exposure Management for App Sec and AI within the ‘Identify’ Capability.
The ‘Identify’ capability focusses on managing the attack surface and continually evaluating the accessibility, exposure, and exploitability of our environments and assets. This involves in supporting building and running all the services (technology, people and process) to perform Threat Exposure Management along with responsibility for managing the output and working with stakeholders to close any discovered issues.
As part of the ‘Identify’ capability within the Threat Exposure Management function, the Senior Cyber Analyst – Threat Exposure Management has the responsibility for overseeing the continual evolution of the organisation’s threat exposure management lifecycle and reduction programmes within a given scope, and reports to the Cyber Manager – Threat Exposure Management. This role ensures that exposures across the Code, Application and AI environments are proactively identified, prioritised, validated, and remediated in alignment with business risk and operational resilience requirements.
The successful candidate must demonstrate a strong track record in performing in-depth technical assessments, and delivering clear, expert insights on identified vulnerabilities and exposures, including validation, prioritisation, and contextual analysis. They will be responsible for helping to establish and refine best practices for threat exposure management and vulnerability management, whilst effectively influencing stakeholders across the organisation. The role requires advanced technical expertise in exposure analysis and defensive and offensive security, with the ability to lead detailed technical discussions and perform complex investigations across Identity technologies.
Key Responsibilities:
> Threat Exposure Management and Vulnerability Management
- Perform detailed analysis of vulnerabilities and exposures across the source-code repositories, applications, and AI/ML ecosystems attack surface.
- Support other attack surface technologies such as IT, OT/ICS, cloud environments, containers, applications, identity systems, data platforms.
- Execute the full exposure lifecycle, including asset discovery, authenticated scanning, enumeration, exploitability assessment, enrichment, and risk-based prioritisation.
- Maintain reliable integration and data quality across VM, CTEM, App Sec, CSPM, ASM/EASM, and asset-inventory platforms to ensure complete and accurate attack-surface visibility.
- Collaborate with Threat Intelligence, Red Team, and Incident Response to validate exploit paths, map findings to adversary TTPs, and translate technical risks into clear remediation actions.
- Assess cloud, code assets, and AI/ML technologies for misconfigurations, privilege issues, insecure interfaces, and emerging exposure patterns, supporting timely remediation and control hardening.
> Operational Excellence & Quality Obsession
- Contribute to SOPs, playbooks, and continuous-improvement initiatives across VM and CTEM services, ensuring processes are consistent, repeatable, and aligned with high-standards services and deliverables.
- Support optimisation of VM, ASM/EASM, CSPM, CTEM, and App Sec toolsets, ensuring reliable coverage, accurate data, and high-fidelity results.
- Ensure high data-quality standards across exposure findings, asset attribution, prioritisation logic, and reporting outputs.
- Collaborate effectively across Identity, Respond, Detect, Protect, Strategy, Delivery, Platform Engineering, Threat Intelligence, Architecture, Risk, Issues Engineers, and Portfolio Cyber Leads to drive aligned, timely remediation outcomes.
> Reporting, Analytics & Metrics
- Support to produce accurate reporting and dashboards on vulnerabilities, Critically Exposed Assets (CEAs), exposure windows, burndown trends, and remediation progress, ensuring high data quality across all sources.
- Validate and maintain data integrity by troubleshooting attribution issues, correcting inconsistencies across VM, CTEM, App Sec, CSPM, ASM/EASM, and asset-inventory platforms.
- Analyse exposure patterns and metric trends to provide insights that support prioritisation, operational decisions, and continuous-improvement actions.
- Support leadership reporting by preparing inputs for scorecards, deep dives, and performance reviews, while identifying opportunities to enhance KPIs and metric definitions.
We are looking for:
- 5-7+ years of progressive experience in enterprise cyber security with demonstrable in-depth technical expertise across Threat Exposure Management, Vulnerability Management, Defensive and Offensive Security applied to Identity technologies, whilst Application Security, Cloud Security, Data, OT/ICS, and AI/ML Security are beneficial.
- Experience must span large-scale, heterogeneous environments with complex technology stacks. Certifications such as CISSP, GIAC, Microsoft Identity and Security, IGA, PAM are advantageous, but equivalent hands-on technical capability, advanced analytical proficiency, and a strong record of continuous learning and practical security training are essential.
- Deep understanding of vulnerability classes, exploit vectors, configuration weaknesses, and exposure patterns across Windows, Linux, network devices, cloud services, containers, applications, and OT/ICS systems.
- Strong ability to perform exploitability assessment, correlate vulnerabilities with attacker behaviour (MITRE ATT&CK), and differentiate real risk from noise or false positives.
- Hands-on experience with VM/CTEM tooling and pipelines, including, but not limited to authenticated scanning, asset discovery methods, CSPM, App Sec (SAST/SCA/DAST/IaC), ASM/EASM platforms, passive/active enumeration and validating high-risk Critically Exposed Assets (CEAs).
- Strong capability to validate data accuracy, match assets, reconcile mismatches, and ensure consistent exposure attribution and ability to analyse trend data, identify anomalies, and provide actionable insights.
- Strong knowledge of AD/Entra ID, Kerberos, NTLM, PKI, certificate chains, CRLs/OCSP, SPNs, federation, MFA, and the ability to identify high-risk identity misconfigurations such as insecure trust relationships, expired or weak certificates, unconstrained delegation, and stale privileges.
- Skilled in analysing identity attack paths, identifying lateral movement, privilege escalation, token abuse, SPN abuse, mis-issued certificates, and validating high-fidelity identity exposures including certificate-related attack vectors.
- Proficient in cloud and hybrid identity setups (Azure AD/Entra, ADFS, Azure AD Connect) including IAM roles, service principals, OAuth/OIDC flows, certificate-based authentication, SCIM provisioning, and detection of identity drift, sync failures, or insecure connectors.
- Ability to identify cloud and DNS-related exposure paths such as dangling DNS records, orphaned service endpoints, misconfigured identity endpoints, excessive cloud privileges, insecure APIs, and domain-federation weaknesses across CSPs such as, Azure, AWS, and GCP.
- Knowledge of PAM/PAW, JIT/JEA models, IGA (Sail Point, Saviynt), and Zero Trust identity principles, with the ability to spot toxic privilege combinations, entitlement sprawl, and policy drift.
- Ability to correlate identity exposures with adversary TTPs, credential abuse techniques, Golden Ticket/SAML attacks, and map identity weaknesses within wider attack paths across apps, cloud, and infrastructure.
- Knowledge of PAM/PAW, JIT/JEA, IGA platforms (Sail Point, Saviynt), certificate lifecycle governance, and Zero Trust identity principles, with the ability to spot toxic privileges, over-permissioned service accounts, and unmanaged certificate trust chains.
- Ability to correlate identity exposures with adversary TTPs, including certificate forgery (Golden Ticket, Golden SAML, forged smartcard auth), credential theft, dangling DNS exploitation, and map identity weaknesses into broader attack paths across infrastructure, cloud, and applications.
#hybrid
Maersk is committed to a diverse and inclusive workplace, and we embrace different styles of thinking. Maersk is an equal opportunities employer and welcomes applicants without regard to race, colour, gender, sex, age, religion, creed, national origin, ancestry, citizenship, marital status, sexual orientation, physical or mental disability, medical condition, pregnancy or parental leave, veteran status, gender identity, genetic information, or any other characteristic protected by applicable law. We will consider qualified applicants with criminal histories in a manner consistent with all legal requirements.
We are happy to support your need for any adjustments during the application and hiring process. If you need special assistance or an accommodation to use our website, apply for a position, or to perform a job, please contact us by emailing accommodationrequests@maersk.com.
Total Views
0
Apply Clicks
0
Mock Applicants
0
Scraps
0
Similar Jobs

Principal Associate, Process Manager (Hybrid)
Capital One · 3 Locations

Principal Project Manager, Airport Lounge Network
Capital One · 3 Locations

Account Manager / Senior Account Manager
AIG · Kuala Lumpur
Senior Account Management Specialist (SMB)
Coupang · Tokyo, Japan

Gestionaire Principal, Pièces de Rechange | Spare Parts Services Senior Manager
Collins Aerospace (RTX) · CA-QC-LONGUEUIL-J01 ~ 1000 Blvd Marie-Victorin ~ J01 BLDG
About Maersk

Maersk
PublicA.P. Møller – Mærsk A/S, usually known simply as Maersk, is a Danish shipping and logistics company founded in 1904 by Arnold Peter Møller and his father Peter Mærsk Møller.
10,001+
Employees
Copenhagen
Headquarters
$30B
Valuation
Reviews
3.5
10 reviews
Work Life Balance
3.8
Compensation
3.2
Culture
3.5
Career
2.8
Management
3.3
68%
Recommend to a Friend
Pros
Great place to learn and grow
Good work-life balance and flexibility
Amazing benefits and opportunities
Cons
Limited career advancement and growth
Management and micromanagement issues
Frequent company restructuring
Salary Ranges
38 data points
Mid/L4
Mid/L4 · Business Intelligence Engineer
1 reports
$184,600
total / year
Base
$142,000
Stock
-
Bonus
-
$184,600
$184,600
Interview Experience
44 interviews
Difficulty
3.4
/ 5
Duration
14-28 weeks
Offer Rate
34%
Experience
Positive 63%
Neutral 25%
Negative 12%
Interview Process
1
Phone Screen
2
Technical Interview
3
Hiring Manager
4
Team Fit
Common Questions
Technical skills
Past experience
Team collaboration
Problem solving
News & Buzz
Shipping giant Maersk to take over Panama Canal ports after court ruling - Al Jazeera
Source: Al Jazeera
News
·
5w ago
Maersk to take over Panama Canal port operations from HK firm - Key Biscayne Portal
Source: Key Biscayne Portal
News
·
5w ago
APMT to run Hutchison’s Panama terminals on interim basis after court ruling - Journal of Commerce
Source: Journal of Commerce
News
·
5w ago
Court Blocks Hong Kong Company from Operating Panama Canal Ports in Win for Trump Admin - National Review
Source: National Review
News
·
5w ago