{"id":10144,"date":"2026-01-20T11:20:00","date_gmt":"2026-01-20T11:20:00","guid":{"rendered":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/"},"modified":"2026-01-20T11:20:12","modified_gmt":"2026-01-20T11:20:12","slug":"2c23961f-10ee-431f-8fe2-68419157187c","status":"publish","type":"post","link":"https:\/\/thefinancialincome.com\/pt\/2c23961f-10ee-431f-8fe2-68419157187c\/","title":{"rendered":"Int. Security Operations Analyst: Pen Testing, Vulnerability &#038; Automation"},"content":{"rendered":"<\/p>\n<\/p>\n<div style=\"background: #ffffff; border-radius: 12px; box-shadow: 0 10px 30px rgba(0, 0, 0, 0.1); width: 100%; max-width: 340px; padding: 25px; transition: transform 0.3s ease-in-out; overflow: visible; display: flex; flex-direction: column; position: relative; border: 1px solid #28a745; margin-top: 70px; margin-bottom: 50px; margin-left: auto; margin-right: auto;\">\n<div style=\"position: absolute; top: -35px; right: 15px; color: #28a745; padding: 5px 10px; border-radius: 6px; font-size: 14px; font-weight: bold; display: flex; align-items: center; z-index: 10;\">Recomendado para voc\u00ea<\/div>\n<div data-namespace-header=\"\" style=\"\">\n<h3 data-namespace-title=\"\" style=\"color: #333; font-size: 20px; font-weight: bold; text-align: left; margin-right: 50px; min-height: 50px; margin-top: 0px;\">Int. Security Operations Analyst<\/h3>\n<\/p><\/div>\n<p data-namespace-prompt=\"\" style=\"font-size: 16px; color: #666; margin-bottom: 20px; line-height: 1.5; flex-grow: 1; text-align: left; margin-top: 0px;\">Coordinate pen testing and remediation, use top vulnerability tools, work with cross-functional teams. A full-time, permanent role with competitive pay and growth prospects in cybersecurity.<\/p>\n<p>    <a data-namespace-url=\"\" href=\"https:\/\/thefinancialincome.com\/pt\/redirect\/?https:\/\/www.jobillico.com\/en\/job-offer\/si-systemsiJxzWu\/int.-security-operations-analyst-vulnerability-threat-management-to-oversee-pen-testing-and-remediation-efforts-for-our-payments-client\/16758276?utm_campaign=google_jobs_apply&#038;utm_source=google_jobs_apply&#038;utm_medium=organic\" style=\"width: 100%; display: inline-block; color: white; text-decoration: none; border-radius: 6px; font-size: 16px; font-weight: bold; text-align: center; transition: transform 0.3s ease, background 0.3s ease; margin-top: auto;\" data-namespace-id=\"5c0d2565-3ba9-4280-a382-ad2a691e2285\"><br \/>\n        <button style=\"width: 100%; height: 55px; background: #e9e9ed; border: 1px solid black; color: black;\">Candidate-se \u00e0 vaga<\/button><br \/>\n    <\/a><br \/>\n    <small style=\"margin-top: 10px; color: #777; font-size: 12px; text-align: center; display: block;\">Voc\u00ea ser\u00e1 redirecionado para outro site.<\/small>\n<\/div>\n<p><!-- Job Overview --><\/p>\n<p>This new opportunity as an Int. Security Operations Analyst places a focus on cybersecurity, offering a stable permanent, full-time role. Salary will be negotiated, making it fitting for experienced professionals ready for growth. The job is open for immediate start, so you won&#8217;t have to wait long to step into your next career move.<\/p>\n<p><!-- Responsibilities Section --><\/p>\n<h3>Principais responsabilidades<\/h3>\n<p>If you join this position, your main duties centre on organizing and overseeing penetration testing assignments. You\u2019ll work with both internal departments and third-party providers to schedule, scope, and review findings. Generating vulnerability reports and communicating recommendations to stakeholders is another primary task. You\u2019ll implement automation for efficiency, acting as the resident subject matter expert on vulnerability and threat management. Supporting remediation and tracking progress ensures risks are mitigated fast and effectively.<\/p>\n<p><!-- Pros Section --><\/p>\n<h3>Vantagens do Cargo<\/h3>\n<p>This role places you at the forefront of cybersecurity, providing a significant career advancement opportunity. It values proactive contributors and encourages continuous learning of the latest vulnerability management tech. Collaboration is strong\u2014 you will interact closely with diverse teams, expanding your knowledge and influence. The permanent status and competitive pay help provide career stability. Utilizing well-known scanning platforms further develops and sharpens your expertise.<\/p>\n<p><!-- Cons Section --><\/p>\n<h3>Poss\u00edveis desvantagens<\/h3>\n<p>Being a central point for remediation can be demanding and require excellent time management, especially when balancing multiple testing cycles. The job demands working across multiple platforms and with outside parties, which occasionally leads to complicated workflows. If you prefer routine tasks or little interaction with others, this isn\u2019t the right fit. Handling critical security matters often means additional pressure to meet deadlines.<\/p>\n<p><!-- Verdict Section --><\/p>\n<h3>Final Take<\/h3>\n<p>For cybersecurity professionals looking to step up, this Int. Security Operations Analyst role is both challenging and rewarding. Its focus on real-world testing, vulnerability management, and interaction with several teams is a career booster. If you thrive on solving security issues and enjoy multitasking in a dynamic environment, it\u2019s a strong fit.<\/p>\n<div style=\"background: #ffffff; border-radius: 12px; box-shadow: 0 10px 30px rgba(0, 0, 0, 0.1); width: 100%; max-width: 340px; padding: 25px; transition: transform 0.3s ease-in-out; overflow: visible; display: flex; flex-direction: column; position: relative; border: 1px solid #28a745; margin-top: 70px; margin-bottom: 50px; margin-left: auto; margin-right: auto;\">\n<div style=\"position: absolute; top: -35px; right: 15px; color: #28a745; padding: 5px 10px; border-radius: 6px; font-size: 14px; font-weight: bold; display: flex; align-items: center; z-index: 10;\">Recomendado para voc\u00ea<\/div>\n<div data-namespace-header=\"\" style=\"\">\n<h3 data-namespace-title=\"\" style=\"color: #333; font-size: 20px; font-weight: bold; text-align: left; margin-right: 50px; min-height: 50px; margin-top: 0px;\">Int. Security Operations Analyst<\/h3>\n<\/p><\/div>\n<p data-namespace-prompt=\"\" style=\"font-size: 16px; color: #666; margin-bottom: 20px; line-height: 1.5; flex-grow: 1; text-align: left; margin-top: 0px;\">Coordinate pen testing and remediation, use top vulnerability tools, work with cross-functional teams. A full-time, permanent role with competitive pay and growth prospects in cybersecurity.<\/p>\n<p>    <a data-namespace-url=\"\" href=\"https:\/\/thefinancialincome.com\/pt\/redirect\/?https:\/\/www.jobillico.com\/en\/job-offer\/si-systemsiJxzWu\/int.-security-operations-analyst-vulnerability-threat-management-to-oversee-pen-testing-and-remediation-efforts-for-our-payments-client\/16758276?utm_campaign=google_jobs_apply&#038;utm_source=google_jobs_apply&#038;utm_medium=organic\" style=\"width: 100%; display: inline-block; color: white; text-decoration: none; border-radius: 6px; font-size: 16px; font-weight: bold; text-align: center; transition: transform 0.3s ease, background 0.3s ease; margin-top: auto;\" data-namespace-id=\"5c0d2565-3ba9-4280-a382-ad2a691e2285\"><br \/>\n        <button style=\"width: 100%; height: 55px; background: #e9e9ed; border: 1px solid black; color: black;\">Candidate-se \u00e0 vaga<\/button><br \/>\n    <\/a><br \/>\n    <small style=\"margin-top: 10px; color: #777; font-size: 12px; text-align: center; display: block;\">Voc\u00ea ser\u00e1 redirecionado para outro site.<\/small>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Explore the Int. Security Operations Analyst opportunity from S.i. Systems! Organize pen testing, drive remediation, leverage automation and advance your cybersecurity career today.<\/p>","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Int. Security Operations Analyst: Pen Testing, Vulnerability &amp; Automation - The Financial Income<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thefinancialincome.com\/pt\/2c23961f-10ee-431f-8fe2-68419157187c\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Int. Security Operations Analyst: Pen Testing, Vulnerability &amp; Automation - The Financial Income\" \/>\n<meta property=\"og:description\" content=\"Explore the Int. Security Operations Analyst opportunity from S.i. Systems! Organize pen testing, drive remediation, leverage automation and advance your cybersecurity career today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thefinancialincome.com\/pt\/2c23961f-10ee-431f-8fe2-68419157187c\/\" \/>\n<meta property=\"og:site_name\" content=\"The Financial Income\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-20T11:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T11:20:12+00:00\" \/>\n<meta name=\"author\" content=\"Bruno Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Gianni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/\"},\"author\":{\"name\":\"Bruno Gianni\",\"@id\":\"https:\/\/thefinancialincome.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4\"},\"headline\":\"Int. Security Operations Analyst: Pen Testing, Vulnerability &#038; Automation\",\"datePublished\":\"2026-01-20T11:20:00+00:00\",\"dateModified\":\"2026-01-20T11:20:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/\"},\"wordCount\":412,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/thefinancialincome.com\/#organization\"},\"articleSection\":[\"Hidden\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/\",\"url\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/\",\"name\":\"Int. Security Operations Analyst: Pen Testing, Vulnerability & Automation - The Financial Income\",\"isPartOf\":{\"@id\":\"https:\/\/thefinancialincome.com\/#website\"},\"datePublished\":\"2026-01-20T11:20:00+00:00\",\"dateModified\":\"2026-01-20T11:20:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thefinancialincome.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Int. Security Operations Analyst: Pen Testing, Vulnerability &#038; Automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thefinancialincome.com\/#website\",\"url\":\"https:\/\/thefinancialincome.com\/\",\"name\":\"The Financial Income\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/thefinancialincome.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thefinancialincome.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thefinancialincome.com\/#organization\",\"name\":\"The Financial Income\",\"url\":\"https:\/\/thefinancialincome.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/thefinancialincome.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thefinancialincome.com\/wp-content\/uploads\/sites\/509\/2025\/12\/cropped-The-Financial-Income-01_-1.png\",\"contentUrl\":\"https:\/\/thefinancialincome.com\/wp-content\/uploads\/sites\/509\/2025\/12\/cropped-The-Financial-Income-01_-1.png\",\"width\":478,\"height\":455,\"caption\":\"The Financial Income\"},\"image\":{\"@id\":\"https:\/\/thefinancialincome.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/thefinancialincome.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4\",\"name\":\"Bruno Gianni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/thefinancialincome.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g\",\"caption\":\"Bruno Gianni\"},\"description\":\"Bruno writes the way he lives, with curiosity, care, and respect for people. He likes to observe, listen, and try to understand what is happening on the other side before putting any words on the page.For him, writing is not about impressing, but about getting closer. It is about turning thoughts into something simple, clear, and real. Every text is an ongoing conversation, created with care and honesty, with the sincere intention of touching someone, somewhere along the way.\",\"url\":\"https:\/\/thefinancialincome.com\/pt\/author\/bcgianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Int. Security Operations Analyst: Pen Testing, Vulnerability & Automation - The Financial Income","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thefinancialincome.com\/pt\/2c23961f-10ee-431f-8fe2-68419157187c\/","og_locale":"pt_BR","og_type":"article","og_title":"Int. Security Operations Analyst: Pen Testing, Vulnerability & Automation - The Financial Income","og_description":"Explore the Int. Security Operations Analyst opportunity from S.i. Systems! Organize pen testing, drive remediation, leverage automation and advance your cybersecurity career today.","og_url":"https:\/\/thefinancialincome.com\/pt\/2c23961f-10ee-431f-8fe2-68419157187c\/","og_site_name":"The Financial Income","article_published_time":"2026-01-20T11:20:00+00:00","article_modified_time":"2026-01-20T11:20:12+00:00","author":"Bruno Gianni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Gianni","Est. reading time":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#article","isPartOf":{"@id":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/"},"author":{"name":"Bruno Gianni","@id":"https:\/\/thefinancialincome.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4"},"headline":"Int. Security Operations Analyst: Pen Testing, Vulnerability &#038; Automation","datePublished":"2026-01-20T11:20:00+00:00","dateModified":"2026-01-20T11:20:12+00:00","mainEntityOfPage":{"@id":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/"},"wordCount":412,"commentCount":0,"publisher":{"@id":"https:\/\/thefinancialincome.com\/#organization"},"articleSection":["Hidden"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/","url":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/","name":"Int. Security Operations Analyst: Pen Testing, Vulnerability & Automation - The Financial Income","isPartOf":{"@id":"https:\/\/thefinancialincome.com\/#website"},"datePublished":"2026-01-20T11:20:00+00:00","dateModified":"2026-01-20T11:20:12+00:00","breadcrumb":{"@id":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/thefinancialincome.com\/2c23961f-10ee-431f-8fe2-68419157187c\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thefinancialincome.com\/"},{"@type":"ListItem","position":2,"name":"Int. Security Operations Analyst: Pen Testing, Vulnerability &#038; Automation"}]},{"@type":"WebSite","@id":"https:\/\/thefinancialincome.com\/#website","url":"https:\/\/thefinancialincome.com\/","name":"The Financial Income","description":"","publisher":{"@id":"https:\/\/thefinancialincome.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thefinancialincome.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/thefinancialincome.com\/#organization","name":"The Financial Income","url":"https:\/\/thefinancialincome.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/thefinancialincome.com\/#\/schema\/logo\/image\/","url":"https:\/\/thefinancialincome.com\/wp-content\/uploads\/sites\/509\/2025\/12\/cropped-The-Financial-Income-01_-1.png","contentUrl":"https:\/\/thefinancialincome.com\/wp-content\/uploads\/sites\/509\/2025\/12\/cropped-The-Financial-Income-01_-1.png","width":478,"height":455,"caption":"The Financial Income"},"image":{"@id":"https:\/\/thefinancialincome.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/thefinancialincome.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4","name":"Bruno Gianni","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/thefinancialincome.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g","caption":"Bruno Gianni"},"description":"Bruno writes the way he lives, with curiosity, care, and respect for people. He likes to observe, listen, and try to understand what is happening on the other side before putting any words on the page.For him, writing is not about impressing, but about getting closer. It is about turning thoughts into something simple, clear, and real. Every text is an ongoing conversation, created with care and honesty, with the sincere intention of touching someone, somewhere along the way.","url":"https:\/\/thefinancialincome.com\/pt\/author\/bcgianni\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Bruno Gianni","author_link":"https:\/\/thefinancialincome.com\/pt\/author\/bcgianni\/"},"uagb_comment_info":0,"uagb_excerpt":"Explore the Int. Security Operations Analyst opportunity from S.i. Systems! Organize pen testing, drive remediation, leverage automation and advance your cybersecurity career today.","_links":{"self":[{"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/posts\/10144"}],"collection":[{"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/comments?post=10144"}],"version-history":[{"count":1,"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/posts\/10144\/revisions"}],"predecessor-version":[{"id":10147,"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/posts\/10144\/revisions\/10147"}],"wp:attachment":[{"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/media?parent=10144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/categories?post=10144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thefinancialincome.com\/pt\/wp-json\/wp\/v2\/tags?post=10144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}