Jobs Security Analyst

27
  • Β· 199 views Β· 9 applications Β· 1d

    Information Security Analyst

    Full Remote Β· Ukraine Β· Product Β· 2 years of experience Β· English - B2
    Position Name: Information Security Analyst Reports to: Chief Information Security Officer Location/Type: Remote (UA Candidates only) Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge...

    Position Name: Information Security Analyst
    Reports to: Chief Information Security Officer
    Location/Type: Remote (UA Candidates only)

     

    Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge funds and other investment firms. Founded in 2016, we have grown year over year through our uncompromising focus on service.

    We value ownership, execution, growth, intelligence, and camaraderie. We are looking for people who share our Core Values, thrive, and contribute to this environment while putting the customer first. At Atlas Technica, we offer a competitive salary, comprehensive benefits, and great perks to our global Team. We strive to maintain a professional yet friendly environment while promoting professional and career development for our Team Members. Join Atlas Technica now!

    We seek a skilled Information Security Analyst to join our rapidly growing organization. This is a highly technical role providing excellent career development opportunities for the successful candidate. You will be work closely with the Chief Information Security Officer (CISO) and various teams to maintain and improve the security posture of Atlas and its clients. As a new position, this role will evolve, providing opportunities for growth and adaptation.

     

    Responsibilities:

     

    Vulnerability Management:

    • Review vulnerability reports.
    • Research scalable solutions for vulnerability remediation.
    • Collaborate with Support/NOC to ensure remediations have minimal impact on clients and facilitate maintenance windows.
    • Work with CS/Engineering to script and automate remediations.
    • Track progress in ticketing system, including master tickets for multi-client initiatives and sub tickets for individual clients.
    • Address vulnerabilities for clients' third-party vulnerability management, including overlap with Cavelo, and apply remedies to other clients.

    Risk Management and Due Diligence:

    • Provide accurate and timely responses to Due Diligence Questionnaires (DDQs).
    • Review and analyze findings from risk assessments and penetration tests for Atlas and clients.
    • Address identified vulnerabilities and recommend remediation strategies.
    • Participate in Business Impact Analyses and tabletop exercises to enhance organizational resilience.

    Industry Benchmark Alignment and Standards Updating:

    • Start measuring alignment with Microsoft benchmarks in Intune and work on increasing the score.
    • Address vulnerabilities and issues identified in workstation builds, cloud infrastructure configurations, and security configurations.
    • Harden systems to enhance security across workstations, cloud infrastructure, and security configurations.

    SOC 2 Maintenance and Additional Security Tasks:

    • Perform test restores.
    • Conduct reviews of our KnowBe4 phishing tests and training.
    • Review SIEM logs.
    • Assist in addressing cybersecurity incidents.
    • Work with NOC and outsourced SOC on remediation runbooks.
    • Perform additional tasks as assigned to support the security team and organization.

       

    Requirements:

    β€’ Strong understanding of cybersecurity principles and practices.
    β€’ Experience with vulnerability management and remediation.
    β€’ Familiarity with Microsoft Intune and security benchmarks.
    β€’ Excellent analytical and problem-solving skills.
    β€’ Ability to work collaboratively with cross-functional teams.
    β€’ Strong communication skills, both written and verbal.
    β€’ Strong ability to work independently.
    β€’ Experience with security tools (SIEM, IDS/IPS, vulnerability scanners).
    β€’ Experience with RMM/SOAR and other automation platforms.
    β€’ Experience scripting.
    β€’ Experience writing runbooks.

     

    Desirable Qualities:

    β€’ Experience working in an MSP environment (preferred, but not required).
    β€’ Relevant certifications (AZ-500, SC-900, SC-300, CompTIA Security+, etc.)

    More
  • Β· 26 views Β· 0 applications Β· 1d

    IT Security Specialist

    Full Remote Β· Poland, Ukraine Β· 3 years of experience Β· English - B2
    We are seeking a hands-on IT Security Specialist to design, implement, and operate effective security controls across our corporate IT and SaaS ecosystems. This role focuses on endpoint, identity, and SaaS security, building and maintaining secure...

    We are seeking a hands-on IT Security Specialist to design, implement, and operate effective security controls across our corporate IT and SaaS ecosystems. This role focuses on endpoint, identity, and SaaS security, building and maintaining secure baselines through effective use of MDM, EDR, and IAM, while ensuring controls are measurable, documented, and continuously improved.

    You will work closely with Security and IT, Delivery, and Business stakeholders to reduce security risk, improve operational resilience, strengthen company-wide security awareness, and support audit readiness (SOC 2 / ISO/IEC 27001) through strong documentation, evidence collection, and continuous control improvement via GRC workflows.

    Responsibilities

    • Implement and administer MDM, EDR, and IAM controls (device enrollment & baselines, endpoint protection policies, hardening, SSO/MFA, conditional access, access reviews, etc.).
    • Maintain and continuously improve the security baseline for endpoints and corporate SaaS services.
    • Conduct regular security audits and assessments to ensure compliance with industry best practices and regulatory requirements (e.g., GDPR, ISO/IEC 27001, HIPAA).
    • SIEM implementation, onboarding log sources, maintaining ingestion, and alerting.
    • Perform risk assessments and recommend appropriate mitigation strategies.
    • Prepare and maintain security awareness materials and support company-wide security awareness activities to improve employees’ cyber hygiene.
    • Manage and respond to security incidents, including investigation, containment, eradication, recovery, and post-incident analysis.
    • Support vulnerability and patch remediation workflows.
    • Contribute to the development and maintenance of internal policies, procedures, and controls related to security and compliance.
    • Support SOC 2 and ISO/IEC 27001 readiness by maintaining evidence, assisting with control implementation tracking, and operating via GRC workflows where applicable.
    • Collaborate with other teams on secure onboarding of systems/vendors and ongoing security improvements.
    • Monitor and mitigate phishing, malware, and other cyber threats.
    • Maintain awareness of emerging threats and recommend improvements.

       

    Requirements

    • 3+ years of hands-on experience in an IT service/outsourcing company in the position of IT Security / SecOps with strong security ownership.
    • Proven hands-on experience implementing and administering CrowdStrike Falcon (EDR/XDR), ManageEngine Endpoint Central (Zoho), and Okta IAM, in real environments (not just β€œfamiliarity”).
    • Strong understanding of endpoint and identity security fundamentals (device hardening, patching, MFA/SSO, conditional access, access lifecycle, etc.).
    • Hands-on experience with SIEM/log aggregation, including SIEM implementation, onboarding log sources, maintaining reliable log ingestion pipelines, and configuring alerting/use cases.
    • Solid understanding of SaaS security.
    • Experience with Google Workspace security administration at scale.
    • Practical familiarity with SOC 2 and/or ISO/IEC 27001 concepts and operational routines.
    • Experience in investigating security events and incidents, conducting root cause analysis, and producing post-incident reports.
    • Basic scripting knowledge (Bash, Python, PowerShell) for automation.
    • Strong analytical and troubleshooting skills, ability to work with logs, alerts, and system telemetry.
    • Ability to write and maintain technical documentation (policies, standards, processes, playbooks).
    • English: Upper intermediate or higher.
    • Ability to work independently and as part of a team.
    • Strong communication and interpersonal skills.


     

    Would be a plus:

    • Familiarity with data privacy and regulatory compliance requirements (e.g., GDPR, HIPAA, PCI DSS).
    • Experience in data-intensive projects (DWH, BI, AI, analytics).



     

     

    More
  • Β· 92 views Β· 6 applications Β· 4d

    Information security engineer

    Ukraine Β· Product Β· 3 years of experience Β· English - B2
    Who weβ€― are:β€― RBI Retail Innovation is a product development company, a part of the group of Raiffeisen Bank International (Vienna, Austria). We are a stable company that works in the EU market. Now we have products in Poland. Our ambition will be...

    Who weβ€― are:β€―

    RBI Retail Innovation is a product development company, a part of the group of Raiffeisen Bank International (Vienna, Austria). We are a stable company that works in the EU market. Now we have products in Poland. Our ambition will be widespread in EU countries in the next few years. Our projects include next-gen digital banking platforms’ design, delivery, and post-delivery activities. Our team is international but mainly consists of Ukrainian developers. We have offices in Kyiv and Rivne. Our mission is to provide seamless banking with ease and speed that’s built for people. Our values are People First, Product Passion, and Trust.

    About you:β€―

    • Atβ€―least 3β€―years ofβ€―experience inβ€―the information security field, including but not limitedβ€―to: Web/Mobile Application Security, Cloud Security, Penetration Testing, Vulnerability Assessment, etc.
    • Ability toβ€―manually find and exploit basic web vulnerabilities
    • Familiarity with OWASP Security Testing Guides, OWASP Top 10
    • Knowledge and understanding ofβ€―Application Security, Cloud Security (AWS), Authentication and Security protocols
    • Strong communication troubleshooting skills
    • Good English skills (Intermediate+)
    • Self-disciplined

    Will beβ€―aβ€―plus:

    • Experience inβ€―web/mobile development
    • Relevance certifications such asβ€―AWS Cloud Security, EC-Council CEH, Offensive Security: OSCP, OSWE, OSCE
    • Security related publications, blog posts, and/or participation inβ€―tools development
    • BugBunty experience (please provide link toβ€―your profile)
    • Experience with various penetration testing tools (e.g., BurpSuite, Metasploit, OWASP ZAP)

    You will:

    Drive company application security and product improvements:

    • Performing security assessment and internal penetration testing
    • Working closely with Developers and DevOps onβ€―promoting, clarification, and implementing leading security mechanisms inβ€―the products and infrastructure
    • Provide guidance onβ€―secure system architecture (including cloud security) and software development processes aiming toβ€―achieve best inβ€―class security for our products
    • Estimate application security risks and suggest mitigation strategies, maintain Threat Modeling
    • Assess current application security posture against OWASP ASVS and MASVS

    Drive vulnerability management including:

    • Provide recommendation and best practice onβ€―vulnerability remediation
    • Facilitate, communicate, and assess mitigation steps
    • Help key stakeholders toβ€―understand the vulnerabilities

    Participateβ€―as (SME) subject matter expert inβ€―security incidents assessment, analysis, and remediation.

     

    What weβ€―offer:β€―

    • You will beβ€―aβ€―part ofβ€―global team ofβ€―RBI Groupβ€―β€” one ofβ€―the leading banking groups inβ€―Central and Eastern Europeβ€―
    • Anβ€―opportunity toβ€―work with some ofβ€―the most talented and experienced people inβ€―the Fintech industryβ€―
    • The ability toβ€―drive change and innovation inβ€―the products weβ€―developβ€―
    • Official employment, gig-contractβ€―
    • Remote-first work modelβ€―
    • Competitive salaryβ€―
    • Personal and professional growth, corporate English coursesβ€―
    • Paid sick days-off and 20 working days of vacation per yearβ€―
    • Medical insuranceβ€―
    More
  • Β· 55 views Β· 11 applications Β· 4d

    Experienced SOC Analyst

    Part-time Β· Full Remote Β· Worldwide Β· 3 years of experience Β· English - A2
    Hello guys, we are looking for a experienced soc analyst who had already worked with Wazuh or Graylog and is experienced in working with alerts. It is best if he is skilled with deep alert management and threat hunting. We are using Wazuh Explore tab for...

    Hello guys,

    we are looking for a experienced soc analyst who had already worked with Wazuh or Graylog and is experienced in working with alerts.

    It is best if he is skilled with deep alert management and threat hunting.

    We are using Wazuh Explore tab for threat hunting but need some guidance to work with alerts. 

    More
  • Β· 52 views Β· 7 applications Β· 9d

    GRC Specialist

    Full Remote Β· Worldwide Β· Product Β· 3 years of experience Β· English - B2 Ukrainian Product πŸ‡ΊπŸ‡¦
    We are the creators of a new fintech era! Our mission is to revolutionize the world by making blockchain technology accessible to everyone in everyday life. WhiteBIT is a global team of more than 1,200 professionals united by a shared vision of shaping...

    We are the creators of a new fintech era!
    Our mission is to revolutionize the world by making blockchain technology accessible to everyone in everyday life. WhiteBIT is a global team of more than 1,200 professionals united by a shared vision of shaping the Web3 future.
    We are building our own blockchain ecosystem, ensuring maximum transparency and security for over 8 million users worldwide. Our cutting-edge solutions, rapid adaptation to market challenges, and technological excellence set us apart from traditional companies.
    Our official partners include the National Football Team of Ukraine, FC Barcelona, Lifecell, FACEIT, and VISA.


    The future of Web3 starts with you β€” join us Cybersecurity Compliance Analyst !


    Requirements:
    Hard Skills:

    - Strong understanding of cybersecurity frameworks and regulations (ISO/IEC 27001, SOC 2, PCI DSS, GDPR, MICA/DORA, CCSS).

    - Hands-on experience with internal audits and evidence collection.

    - Knowledge of risk management principles (ISO 31000, NIST RMF is a plus).

    - Familiarity with network and cloud security basics, data protection, and secure development lifecycle (SSDLC).

    - Understanding of business continuity and disaster recovery concepts.

    Soft Skills:

    - Attention to detail and strong analytical mindset.

    - Excellent written and verbal communication skills.

    - Ability to work effectively with cross-functional teams.

    - Critical thinking and problem-solving approach.

    - Adaptability and willingness to learn.

     

     

    Responsibilities

    - Support the implementation and maintenance of cybersecurity governance frameworks (ISO 27001, SOC 2, PCI DSS, GDPR, MICA/DORA, CCSS).

    - Assist in conducting internal security audits: prepare checklists, perform interviews, collect evidence, and document findings.

    - Maintain and improve cybersecurity policies, procedures, and compliance documentation.

    - Participate in risk assessments for systems, processes, and third-party vendors.

    - Contribute to the development and monitoring of risk registers and control matrices.

    - Assist in Business Continuity (BCP) and Disaster Recovery (DRP) planning and testing.

    - Collaborate with IT, security engineers, legal, and business stakeholders to ensure compliance and mitigate risks.

    - Prepare clear and concise reports on compliance status, audit results, and identified gaps.

     

     

    Work conditions

    Immerse yourself in Crypto & Web3:
    β€” Master cutting-edge technologies and become an expert in the most innovative industry.
    Work with the Fintech of the Future:
    β€” Develop your skills in digital finance and shape the global market.

    Take Your Professionalism to the Next Level:
    β€” Gain unique experience and be part of global transformations.
    Drive Innovations:
    β€” Influence the industry and contribute to groundbreaking solutions.

    Join a Strong Team:
    β€” Collaborate with top experts worldwide and grow alongside the best.
    Work-Life Balance & Well-being:
    β€” Modern equipment.
    β€” Comfortable working conditions, and an inspiring environment to help you thrive.
    β€” 24 calendar days of paid leave.
    β€” 5 calendar days of sick leave.
    β€” Additional days off for national holidays.

    More
  • Β· 148 views Β· 8 applications Β· 12d

    SOC Analyst L1 (Trainee/Junior)

    Full Remote Β· Ukraine Β· Product Β· 0.5 years of experience Β· English - B1 Ukrainian Product πŸ‡ΊπŸ‡¦
    We are the creators of a new fintech era! Our mission is to revolutionize the world by making blockchain technology accessible to everyone in everyday life. WhiteBIT is a global team of more than 1,200 professionals united by a shared vision of shaping...

    We are the creators of a new fintech era!
    Our mission is to revolutionize the world by making blockchain technology accessible to everyone in everyday life. WhiteBIT is a global team of more than 1,200 professionals united by a shared vision of shaping the Web3 future.
    We are building our own blockchain ecosystem, ensuring maximum transparency and security for over 8 million users worldwide. Our cutting-edge solutions, rapid adaptation to market challenges, and technological excellence set us apart from traditional companies.
    Our official partners include the National Football Team of Ukraine, FC Barcelona, Lifecell, FACEIT, and VISA.

    The future of Web3 starts with you β€” join us as a SOC Analyst L1!

     

    Requirements:

    β€” Basic understanding of cybersecurity principles, common attack vectors, and threat detection methods.
    β€” Familiarity with key cybersecurity frameworks (MITRE ATT&CK, NIST, CIS etc.)
    β€” Familiarity with EDR/XDR and SIEM platforms (e.g., CrowdStrike, SentinelOne, Splunk, QRadar, etc.).
    β€” Strong analytical and problem-solving skills.
    β€” Ability to work in a fast-paced, team-oriented environment.
    β€” Good written and verbal communication skills in English (B1+).
    β€” Willingness to work in a shift-based schedule, including nights and weekends. Shifts are distributed evenly across the department.

     

    Responsibilities:

    β€” Monitor and analyze alerts from EDR, SIEM platforms and other corporate tools.
    β€” Perform initial triage to determine the severity, credibility, and urgency of security events, sorting out False Positives.
    β€” Escalate incidents to Level 2 analysts or incident response teams when necessary.
    β€” Document findings, actions taken, and outcomes in a ticketing system.
    β€” Follow standard operating procedures (SOPs) and playbooks for alert handling.
    β€” Assist in the continuous tuning of EDR/SIEM rules to reduce False Positives.
    β€” Stay current with emerging threats and industry best practices.
    β€” Participate in active learning and Purple Teaming of the SOC team.

     

    Work conditions:

    Immerse yourself in Crypto & Web3:
    β€” Master cutting-edge technologies and become an expert in the most innovative industry.
    Work with the Fintech of the Future:
    β€” Develop your skills in digital finance and shape the global market.

    Take Your Professionalism to the Next Level:
    β€” Gain unique experience and be part of global transformations.
    Drive Innovations:
    β€” Influence the industry and contribute to groundbreaking solutions.

    Join a Strong Team:
    β€” Collaborate with top experts worldwide and grow alongside the best.
    Work-Life Balance & Well-being:
    β€” Modern equipment.
    β€” Comfortable working conditions, and an inspiring environment to help you thrive.
    β€” 24 calendar days of paid leave.
    β€” 5 calendar days of sick leave.
    β€” Additional days off for national holidays.

    More
  • Β· 126 views Β· 25 applications Β· 19d

    Risk and Fraud Specialist (iGaming)

    Worldwide Β· 1 year of experience Β· English - None
    About the Role We are looking for a Risk & Fraud Specialist to join our iGaming team and help protect the business from fraud, abuse, and compliance risks. This role is ideal for someone who enjoys investigations, data, patterns, and independent...

    About the Role

     

    We are looking for a Risk & Fraud Specialist to join our iGaming team and help protect the business from fraud, abuse, and compliance risks.
    This role is ideal for someone who enjoys investigations, data, patterns, and independent decision-making.

    Fraud evolves daily β€” so we need someone who can think critically, act confidently, and doesn’t need constant instructions or hand-holding.

     

    Responsibilities

     

    • Monitor player activity to detect suspicious or fraudulent behavior (bonus abuse, multi-accounting, AML red flags).
    • Review all first-time deposits (FTDs) daily and apply risk checks.
    • Conduct enhanced due diligence (EDD) on high-risk and high-value players.
    • Investigate player connections to identify syndicates, collusion, or affiliate-related fraud.
    • Perform open-source checks (Google, social media, public data).
    • Review and manage duplicate accounts, including locking/unlocking decisions.
    • Handle player disputes and responsible gaming cases in line with company policies.
    • Monitor responsible gaming behavior (deposit limits, self-exclusion) and escalate concerns when needed.
    • Support GDPR processes: data access requests, account closures, data retention.
    • Maintain clear and accurate investigation records and decisions.
    • Provide feedback to improve fraud tools, risk rules, and internal processes.

       

    Requirements

     

    • Minimum 2+ years of experience in Risk, Fraud, or AML within the iGaming industry.
    • Hands-on experience working under CuraΓ§ao license or MGA.
    • Fluent English (written and spoken).
    • Strong analytical mindset and confidence in independent decision-making.
    • Ability to identify fraud without relying on predefined scripts or constant supervision.

       

    Skills

     

    Must have

    • Solid understanding of fraud typologies and AML principles in online gambling.
    • Experience with fraud prevention tools such as SEON, Sumsub, or similar platforms.
    • Strong analytical skills β€” able to identify patterns, trends, and risks on both individual and systemic levels.
    • High attention to detail and ability to work with sensitive data.
       

    Nice to have

    • Knowledge of Russian or Ukrainian.
       

    What We Offer

     

    πŸ’° Competitive compensation package.

    🌴 20 vacation days + 36 sick days.

    🩺 Health coverage & learning budgets (courses, conferences, certifications).

    🌍 Work with a global team where your impact is visible and direct.

    πŸŽ‚ Bonuses for birthdays & life events.

    🏑 Flexible setup: Remote, Hybrid, or Office β€” your choice.

     

    More
  • Β· 65 views Β· 5 applications Β· 22d

    SOC Analyst

    Office Work Β· Ukraine (Lviv) Β· Product Β· 1 year of experience Β· English - None
    We are looking for an Analyst to join our Information Security Solutions team and contribute to the support and development of the Security Operations Center (SOC) functionality. You will work on tasks related to protecting infrastructure from cyber...

    We are looking for an Analyst to join our Information Security Solutions team and contribute to the support and development of the Security Operations Center (SOC) functionality. You will work on tasks related to protecting infrastructure from cyber threats and improving cybersecurity technologies.

    Key Responsibilities:

    • Monitor systems and detect potential threats using SIEM and other tools.
    • Develop parsers.
    • Perform infrastructure inventory and vulnerability analysis.
    • Analyze and investigate incidents, providing recommendations for risk mitigation.
    • Configure and enhance event correlation rules.
    • Prepare reports and document identified vulnerabilities and incidents.
    • Participate in improving incident response processes and automation, designing security system architecture, and implementing solutions (Firewall, DLP, EDR, etc.).
    • Configure SIEM, SOAR, and other tools.
    • Create and refine incident response procedures and protocols, ensuring compliance with internal policies.
    • Collaborate with other departments to maintain overall information security within the organization.

    Required Skills and Experience:

    • Basic knowledge of cybersecurity: network protocols, vulnerabilities.
    • Knowledge of operating systems (Linux, Windows) at the administrator level.
    • Strong analytical thinking.
    • Understanding of information security tools (FW, IDS/IPS, Antivirus, Windows server OS, etc.).

    Nice to Have:

    • Familiarity with MITRE ATT&CK framework.
    • Experience with scripting languages and regular expressions (Python, PowerShell, Bash).
    • Hands-on experience with SIEM.

      If you are interested in working on breakthrough technologies and making a real impact β€” join us! 


       
    More
  • Β· 32 views Β· 2 applications Β· 23d

    Information Security Lead

    Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· English - B2
    Delasport β€” Implementing Technological Solutions Here and Now. Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for...

    Delasport β€” Implementing Technological Solutions Here and Now.

    Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for Sports Betting and Online Casino from a White-Label, with a full range of management services to a Plug&Play iFrame and a complete Turnkey. We are establishing an R&D center in Kyiv, and are looking for top talents to join our team.


    This position requires full-time office work. Kyiv, 58 Yaroslavska str.


    RESPONSIBILITIES
     

    • Monitor compliance with information security and privacy policies at a technology company.
    • Completing vendor security assessments and reviews.
    • Reviewing security clauses in customer and vendor contracts.
    • Providing, reviewing, and enhancing security training and awareness programs.
    • Management of the organization’s technological risk assessments.
    • Helping security leaders to identify and assess risks of the organization and developing strategies to manage and mitigate these risks.
    • Develop and implement best practices for assessing and evaluating IT and security controls for the organization’s third-party businesses.
    • Manage the penetration testing and technical risk assessments from end to end.
    • Supporting the business with customer engagements, including attending customer calls and supporting our sales teams

     

    REQUIREMENTS
     

    • Minimum of 5 years of experience in a similar role in a technology/software/cloud organization
    • Experience implementing and enforcing information security, regulatory, and privacy policies across the business.
    • Acquaintance working with cyber security tools and products.
    • Solid knowledge of information security principles and practices.
    • Knowledge of risk management frameworks and industry compliance standards such as ISO 27001/ SOC2/ PCI DSS
    • Excellent interpersonal skills and ability to work in a team with multiple interfaces.
    • Experience working at SaaS provider company β€” an advantage.
    • Fluent English
       

    WHAT WE CAN OFFER YOU
     

    • Modern office in Podil with an uninterruptible power supply and the Internet
    • Personal time off (21 business days of paid vacation, paid days on special occasions, sick leaves, emergency days off)
    • Public holidays
    • Health and life insurance with our broker, available starting from the month following the employee’s start date with the company
    • Modern technical equipment
    • English courses with native speakers
    • Ukraine-based educational programs
    • Sports activities reimbursement
    • Corporate entertainments
    • Happy hours on Fridays
    • Gig contract support
    More
  • Β· 191 views Β· 14 applications Β· 25d

    Intern-Junior Security Analyst

    Full Remote Β· Ukraine Β· English - B2
    Project Description: One of the world's largest providers of products and services to the energy industry has a need to develop, support and integrate software system in Oil & Gas domain. You will be a member of a cross functional team. Key project...
    • Project Description:

      One of the world's largest providers of products and services to the energy industry has a need to develop, support and integrate software system in Oil & Gas domain.
      You will be a member of a cross functional team.
      Key project stakeholders are open for innovative ideas.
      Project is based on SCRUM methodology.
      This is a great opportunity to work in an international team, apply and learn modern IT technologies

       

    • Responsibilities:

      Quickly learn new technologies and improve proficiency
      Follow up with Developer on open vulnerabilities
      Share reports of open, closed vulnerabilities
      Develop unique, effective security strategies for software systems, networks, and cloud provider
      Safeguards information system assets by
      identifying and solving potential and actual security problems
      Maintain quality service by following
      organization standards
      Contribute to team effort by accomplishing
      related results as needed

       

    • Mandatory Skills Description:

      Understanding of definitions related to cyber security: Vulnerability, attack vector, threat , security risk, SAST, DAST, WAF ets
      Understanding of networking, Operating systems (Windows and Linux)
      Basic concepts in programming Ex: Python
      Very good English as team is multinational

    More
  • Β· 30 views Β· 1 application Β· 25d

    GRC Specialist

    Office Work Β· Ukraine (Kyiv) Β· Product Β· 2 years of experience Β· English - B1
    Responsibilities: Develop, implement, and maintain documentation for Information Security Management Systems (ISMS) and Business Continuity Management Systems (BCMS). Conduct and support Business Impact Analysis (BIA) for the organization's key...

    Responsibilities: 

    • Develop, implement, and maintain documentation for Information Security Management Systems (ISMS) and Business Continuity Management Systems (BCMS). 
    • Conduct and support Business Impact Analysis (BIA) for the organization's key processes. 
    • Perform risk assessments for processes, assets, and projects. 
    • Develop, maintain, and periodically test Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP). 
    • Participate in the implementation of compliance requirements aligned with ISO 27001, ISO 22301, and other relevant standards. 
    • Prepare documentation for internal and external audits and actively participate in audit activities. 
    • Deliver employee training sessions related to Information Security and Business Continuity policies. 

    Requirements: 

    • 4+ years of experience in information security or business continuity domains. 
    • Practical experience in developing, implementing, and maintaining ISMS and BCMS policies, procedures, and standards. 
    • Strong knowledge of ISO 27001, ISO 22301, and other related frameworks. 
    • Valid certifications such as ISO 27001 Lead Implementer/Auditor and ISO 22301 Implementer/Auditor. 
    • Hands-on experience with audit participation and certification projects. 
    More
  • Β· 43 views Β· 8 applications Β· 25d

    Intern-Junior Security Analyst

    Full Remote Β· Ukraine Β· 1 year of experience Β· English - B2
    One of the world's largest providers of products and services to the energy industry has a need to develop, support and integrate software system in Oil & Gas domain. You will be a member of a cross functional team. Key project stakeholders are open for...

    One of the world's largest providers of products and services to the energy industry has a need to develop, support and integrate software system in Oil & Gas domain.
    You will be a member of a cross functional team.
    Key project stakeholders are open for innovative ideas.
    Project is based on SCRUM methodology.
    This is a great opportunity to work in an international team, apply and learn modern IT technologies

    • Responsibilities:

      Quickly learn new technologies and improve proficiency
      Follow up with Developer on open vulnerabilities
      Share reports of open, closed vulnerabilities
      Develop unique, effective security strategies for software systems, networks, and cloud provider
      Safeguards information system assets by
      identifying and solving potential and actual security problems
      Maintain quality service by following
      organization standards
      Contribute to team effort by accomplishing
      related results as needed

    • Mandatory Skills Description:

      Understanding of definitions related to cyber security: Vulnerability, attack vector, threat , security risk, SAST, DAST, WAF ets
      Understanding of networking, Operating systems (Windows and Linux)
      Basic concepts in programming Ex: Python
      Very good English as team is multinational

    • Nice-to-Have Skills Description:

      Willing to have a hacker mindset and methodology
      Familiar with agile methodologies

    More
  • Β· 51 views Β· 6 applications Β· 26d

    DevSecOps Engineer

    Ukraine Β· Product Β· 3 years of experience Β· English - B1 Ukrainian Product πŸ‡ΊπŸ‡¦
    Our ideal candidate will possess: A β€œShift-Left” Mindset: A passion for integrating security early and throughout the CI/CD pipeline, not as an afterthought; Proficiency in Security Tooling: Hands-on experience with SAST, DAST, SCA, and IaC scanning...

    Our ideal candidate will possess:

    • A β€œShift-Left” Mindset: A passion for integrating security early and throughout the CI/CD pipeline, not as an afterthought;
    • Proficiency in Security Tooling: Hands-on experience with SAST, DAST, SCA, and IaC scanning tools, including within CI/CD platforms (e.g., Jenkins, GitLab CI, GitHub Actions);
    • Cloud-Native Security Expertise: Extensive knowledge of securing cloud environments (AWS, Azure, and/or GCP) and containerized workloads (Docker, Kubernetes);
    • Infrastructure as Code (IaC) Security: Strong experience auditing and securing infrastructure defined in Terraform, Ansible, or SaltStack;
    • Scripting & Automation Mastery: Ability to automate security checks and remediations using scripting and software configuration management tools;
    • Solid Foundational Knowledge and commercial experience in: web apps and infrastructure penetration testing, with a strong understanding of OWASP Top 10, network security, web application firewalls (WAF), and SIEM principles;
    • Threat Modeling & Risk Assessment: Experience with threat modeling methodologies (e.g., STRIDE) to identify and mitigate risks during design phases;
    • Collaborative Communication: Excellent communication skills to articulate security risks to engineers and leadership, fostering a culture of security awareness;
    • Analytical Problem-Solving: Strong investigative and analytical skills to diagnose complex security issues in a dynamic environment.

     

    Will be an advantage:

    Industry certifications such as OSCP, ISO 27001, HTB, CompTIA Security+, CISSP, Microsoft, Cisco, AWS Security Specialty, or GIAC DevSecOps-related certs.

     

    Requirements:

    • Integrate security practices into DevOps pipelines (CI/CD) to enable secure software delivery;
    • Implement, monitor, and improve security automation in infrastructure as code, build, and deployment processes;
    • Handle information security incidents and support root cause analysis;
    • Perform application and infrastructure penetration testing;
    • Continuously perform vulnerability management process to improve resilience of corporate systems, applications, cloud, and container environments;
    • Maintain PCI DSS related procedures;
    • Develop, document, and enforce security policies, standards, and best practices;
    • Maintain compliance with frameworks such as PCI DSS and support secure architecture design reviews;
    • Build and manage secure environments for networks, storage, and cloud services using infrastructure as code;
    • Champion DevSecOps culture across teams by advocating for shift-left security and security-as-code principles.

     

    Required:

    • Scanning tools within CI/CD platforms (e.g., Jenkins, GitLab CI, GitHub Actions, Nexpose, Nessus, Burpsuite, Owasp zap);
    • Securing cloud environments (AWS, Amazon Detective, Azure, and/or GCP) and containerized workloads (Docker, Kubernetes);
    • Auditing and securing infrastructure defined in Terraform, Ansible, or SaltStack.
    • Scripting and software configuration management tools;
    • OWASP Top 10, network security, web application firewalls (WAF), and SIEM principles;
    • Threat modeling methodologies (e.g., STRIDE).

     

    What we offer:

    • Working in a stable company with more than 14-years history in the media market;
    • The opportunity to participate in the creation of a service of the future;
    • Free English lessons;
    • Table tennis lessons;
    • Corporate psychologist;
    • Discounts from partner brands for company employees.

     

    We don’t just want to be an employer β€” we want to be your employer of choice.

    We’d appreciate it if you could take a moment to fill out a short survey about what matters most to you. It will help us better understand candidates’ expectations and create an even more comfortable environment at MEGOGO. Here’s the link: bit.ly/43YaxBH

     

    By responding to the vacancy and sending your CV to the Company (LLC β€œMEGOGO”), registered and operating in accordance with the laws of Ukraine, registration number 38347009, address: Ukraine, 01011, Kyiv, Rybalska Street, building 22 (hereinafter β€œthe Company”), you confirm and agree that the Company processes your personal data presented in your CV in accordance with the Law of Ukraine β€œOn Personal Data Protection” and GDPR.

    More
  • Π€Π°Ρ…Ρ–Π²Π΅Ρ†ΡŒ Π· ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Security Analyst)

    Office Work Β· Ukraine (Kyiv) Β· 2 years of experience Β· English - A2
    АгСнція ΠΎΠ±ΠΎΡ€ΠΎΠ½Π½ΠΈΡ… Π·Π°ΠΊΡƒΠΏΡ–Π²Π΅Π»ΡŒ DOT β€” Π΄Π΅Ρ€ΠΆΠ°Π²Π½Π΅ підприємство, Ρ‰ΠΎ Π·Π°ΠΉΠΌΠ°Ρ”Ρ‚ΡŒΡΡ Π·Π°ΠΊΡƒΠΏΡ–Π²Π»Π΅ΡŽ Ρ‚Π΅Ρ…Π½Ρ–ΠΊΠΈ, боєприпасів, Π‘ΠŸΠ›Π, харчування, одягу, ΠΏΠ°Π»ΠΈΠ²Π½ΠΎ-ΠΌΠ°ΡΡ‚ΠΈΠ»ΡŒΠ½ΠΈΡ… ΠΌΠ°Ρ‚Π΅Ρ€Ρ–Π°Π»Ρ–Π² для Π—Π‘Π£ Ρ‚Π° Π‘ΠΈΠ» ΠžΠ±ΠΎΡ€ΠΎΠ½ΠΈ. Наша місія: Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡ”ΠΌΠΎ Π‘ΠΈΠ»ΠΈ ΠžΠ±ΠΎΡ€ΠΎΠ½ΠΈ Ρ‚Π° Ρ€ΠΎΠ·Π²ΠΈΠ²Π°Ρ”ΠΌΠΎ Π½Π°Ρ†Ρ–ΠΎΠ½Π°Π»ΡŒΠ½ΠΈΠΉ Π’ΠŸΠš...

    АгСнція ΠΎΠ±ΠΎΡ€ΠΎΠ½Π½ΠΈΡ… Π·Π°ΠΊΡƒΠΏΡ–Π²Π΅Π»ΡŒ DOT β€” Π΄Π΅Ρ€ΠΆΠ°Π²Π½Π΅ підприємство, Ρ‰ΠΎ Π·Π°ΠΉΠΌΠ°Ρ”Ρ‚ΡŒΡΡ Π·Π°ΠΊΡƒΠΏΡ–Π²Π»Π΅ΡŽ Ρ‚Π΅Ρ…Π½Ρ–ΠΊΠΈ, боєприпасів, Π‘ΠŸΠ›Π, харчування, одягу, ΠΏΠ°Π»ΠΈΠ²Π½ΠΎ-ΠΌΠ°ΡΡ‚ΠΈΠ»ΡŒΠ½ΠΈΡ… ΠΌΠ°Ρ‚Π΅Ρ€Ρ–Π°Π»Ρ–Π² для Π—Π‘Π£ Ρ‚Π° Π‘ΠΈΠ» ΠžΠ±ΠΎΡ€ΠΎΠ½ΠΈ.

     

    Наша місія: Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡ”ΠΌΠΎ Π‘ΠΈΠ»ΠΈ ΠžΠ±ΠΎΡ€ΠΎΠ½ΠΈ Ρ‚Π° Ρ€ΠΎΠ·Π²ΠΈΠ²Π°Ρ”ΠΌΠΎ Π½Π°Ρ†Ρ–ΠΎΠ½Π°Π»ΡŒΠ½ΠΈΠΉ Π’ΠŸΠš задля стійкості Ρ‚Π° обороноздатності Π£ΠΊΡ€Π°Ρ—Π½ΠΈ.

     

    Наша візія: Π΄Ρ€Π°ΠΉΠ²Π΅Ρ€ Ρ€ΠΎΠ·Π²ΠΈΡ‚ΠΊΡƒ систСми забСзпСчСння Π‘ΠΈΠ» ΠΎΠ±ΠΎΡ€ΠΎΠ½ΠΈ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ Π·Π° стандартами НАВО.
     

     

    Π—Π°Ρ€Π°Π· ΠΌΠΈ Π² ΠΏΠΎΡˆΡƒΠΊΡƒ фахівця Π· ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Security Analyst), який/яка Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π°Ρ‚ΠΈΠΌΠ΅ Π·Π° Π°Π½Π°Π»Ρ–Π· ΠΏΠΎΠ΄Ρ–ΠΉ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, виявлСння Ρ‚Π° розслідування Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Ρ–Π², ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³ стану захищСності систСм, Π° Ρ‚Π°ΠΊΠΎΠΆ Π²Π·Π°Ρ”ΠΌΠΎΠ΄Ρ–ΡŽ Π· командою для своєчасного рСагування Π½Π° Π·Π°Π³Ρ€ΠΎΠ·ΠΈ ΠΉ забСзпСчСння надійності Ρ‚Π° захищСності Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΈΡ… ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ–Π² для Π²Ρ–ΠΉΡΡŒΠΊΠ°.
     

     

    Обов'язки Π½Π° посаді:

     

     

    1. ΠœΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³ ΡΠΏΠΎΠ²Ρ–Ρ‰Π΅Π½ΡŒ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ‚Π° вдосконалСння процСсів: Аналіз ΡΠΏΠΎΠ²Ρ–Ρ‰Π΅Π½ΡŒ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, систСмних ΠΆΡƒΡ€Π½Π°Π»Ρ–Π² Π· ΠΌΠ΅Ρ‚ΠΎΡŽ виявлСння ΠΏΠΎΡ‚Π΅Π½Ρ†Ρ–ΠΉΠ½ΠΈΡ… Π·Π°Π³Ρ€ΠΎΠ· Ρ‚Π° Π°Π½ΠΎΠΌΠ°Π»Ρ–ΠΉ; вдосконалСння Ρ–ΡΠ½ΡƒΡŽΡ‡ΠΈΡ… процСсів для підвищСння СфСктивності виявлСння Ρ‚Π° рСагування Π½Π° ΠΊΡ–Π±Π΅Ρ€Π·Π°Π³Ρ€ΠΎΠ·ΠΈ; Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° Ρ€Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°Ρ†Ρ–ΠΉ Ρ‰ΠΎΠ΄ΠΎ покращСння ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³Ρƒ.
    2. ΠœΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ‚ вразливостСй: ВиявлСння, Π°Π½Π°Π»Ρ–Π· Ρ‚Π° ΠΎΡ†Ρ–Π½ΠΊΠ° вразливостСй Π² ΠΌΠ΅Ρ€Π΅ΠΆΠ΅Π²Ρ–ΠΉ інфраструктурі, Π΄ΠΎΠ΄Π°Ρ‚ΠΊΠ°Ρ… Ρ‚Π° систСмах; вдосконалСння Ρ–ΡΠ½ΡƒΡŽΡ‡ΠΈΡ… процСсів управління вразливостями для своєчасного виявлСння Ρ‚Π° усунСння ΠΏΠΎΡ‚Π΅Π½Ρ†Ρ–ΠΉΠ½ΠΈΡ… Π·Π°Π³Ρ€ΠΎΠ·.
    3. ΠŸΡ€ΠΎΠ°ΠΊΡ‚ΠΈΠ²Π½Π΅ полювання Π½Π° Π·Π°Π³Ρ€ΠΎΠ·ΠΈ: Активний ΠΏΠΎΡˆΡƒΠΊ Ρ‚Π° ідСнтифікація ΠΏΠΎΡ‚Π΅Π½Ρ†Ρ–ΠΉΠ½ΠΈΡ… ΠΊΡ–Π±Π΅Ρ€Π·Π°Π³Ρ€ΠΎΠ· Π² інфраструктурі Ρ‚Π° Ρ—Ρ… усунСння.
    4. Адміністрування Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²ΠΈΡ… Π΄ΠΎΠ΄Π°Ρ‚ΠΊΡ–Π²: SIEM, EDR, антивірус, сканСр вразливостСй (Web application, Network, SAST, DAST), DLP, PAM Ρ– Ρ‚Π΄.
    5. Взаємодія Π· Π†Π’ ΠΏΡ–Π΄Ρ€ΠΎΠ·Π΄Ρ–Π»ΠΎΠΌ, ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π°ΠΌΠΈ Ρ…ΠΌΠ°Ρ€Π½ΠΈΡ… Ρ€Ρ–ΡˆΠ΅Π½ΡŒ Ρ‚Π° ΠΏΠΎΡΡ‚Π°Ρ‡Π°Π»ΡŒΠ½ΠΈΠΊΠ°ΠΌΠΈ послуг Ρƒ сфСрі захисту Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ—.
    6. Π£Ρ‡Π°ΡΡ‚ΡŒ Ρƒβ€― Π³Ρ€ΡƒΠΏΡ– рСагування Π½Π°β€―Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚ΠΈ.
    7. Π£Ρ‡Π°ΡΡ‚ΡŒ Ρƒβ€― ΠΏΡ€ΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ– навчання співробітників.

     

    Π’ΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ‚Ρ–Π²:

     

    1. Π’ΠΈΡ‰Π° Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½Π° освіта.
    2. Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π½Π° Π°Π½Π°Π»ΠΎΠ³Ρ–Ρ‡Π½Ρ–ΠΉ посаді Π½Π΅ мСншС Ρ€ΠΎΠΊΡƒ.
    3. Розуміння процСсу рСагування Π½Π° ΠΊΡ–Π±Π΅Ρ€Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚ΠΈ.
    4. Розуміння ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ–Π² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ…ΠΌΠ°Ρ€Π½ΠΈΡ… ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌ.
    5. Знання Ρ€Ρ–Π·Π½ΠΎΠ²ΠΈΠ΄Ρ–Π² ΡˆΠΊΡ–Π΄Π»ΠΈΠ²ΠΎΠ³ΠΎ ΠŸΠ—, ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ–Π² ΠΉΠΎΠ³ΠΎ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ, ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ–Π² виявлСння Ρ‚Π° рСагування; розуміння основних Π²Π΅ΠΊΡ‚ΠΎΡ€Ρ–Π² Π°Ρ‚Π°ΠΊ Ρ‚Π° сцСнаріїв ΠΏΠΎΡˆΠΈΡ€Π΅Π½Π½Ρ Π·Π°Π³Ρ€ΠΎΠ·.
    6. Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π· SIEM, EDR, DLP, PAM, сканСрами вразливостСй.
    7. Розуміння ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ–Π² ΠΏΡ€ΠΎΠ°ΠΊΡ‚ΠΈΠ²Π½ΠΎΠ³ΠΎ полювання Π½Π° Π·Π°Π³Ρ€ΠΎΠ·ΠΈ (Proactive threat hunting).
    8. Розуміння процСсу ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ‚Ρƒ вразливостСй.
    9. ΠΡƒΠ»ΡŒΠΎΠ²Π° Ρ‚ΠΎΠ»Π΅Ρ€Π°Π½Ρ‚Π½Ρ–ΡΡ‚ΡŒ Π΄ΠΎ ΠΊΠΎΡ€ΡƒΠΏΡ†Ρ–Ρ—.

     

    Π‘ΡƒΠ΄Π΅ ΠΏΠ΅Ρ€Π΅Π²Π°Π³ΠΎΡŽ:

     

    1. Знання Ρƒ Π΄ΠΎΠΌΠ΅Π½Ρ– application security, досвід ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ SSDLC.
    2. Знання ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ–Π² Microsoft.
    3. Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Ρ‚Π° Π½Π°Π»Π°ΡˆΡ‚ΡƒΠ²Π°Π½Π½Ρ NGAV, WAF.

     

    Ми ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”ΠΌΠΎ:

     

    • ΠšΠΎΠΌΠ°Π½Π΄Ρƒ, Π΄Π΅ ΠΊΠΎΠΆΠ΅Π½ Π²Π°ΠΆΠ»ΠΈΠ²ΠΈΠΉ: ΠΌΠΈ ΠΊΠΎΠΌΠ°Π½Π΄Π° ΠΎΠ΄Π½ΠΎΠ΄ΡƒΠΌΡ†Ρ–Π², Π΄Π΅ ΠΏΠ°Π½ΡƒΡ” Π²Π·Π°Ρ”ΠΌΠΎΠΏΠΎΠ²Π°Π³Π° Ρ‚Π° ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΠΊΠ°.
    • ΠŸΡ€ΠΎΠ·ΠΎΡ€Ρ–ΡΡ‚ΡŒ Ρ‚Π° ΡΠΈΡΡ‚Π΅ΠΌΠ½Ρ–ΡΡ‚ΡŒ: Ρ‡Ρ–Ρ‚ΠΊΡ– Ρ†Ρ–Π»Ρ–, Π·Ρ€ΠΎΠ·ΡƒΠΌΡ–Π»Ρ– Π²Π½ΡƒΡ‚Ρ€Ρ–ΡˆΠ½Ρ– ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–Ρ— Ρ‚Π° систСмний ΠΏΡ–Π΄Ρ…Ρ–Π΄.
    • ΠŸΡ€ΠΎΡ„Π΅ΡΡ–ΠΉΠ½Π΅ зростання Ρ‚Π° навчання: ΠΌΠΈ сприяємо постійному Ρ€ΠΎΠ·Π²ΠΈΡ‚ΠΊΡƒ Π½Π°ΡˆΠΈΡ… ΠΏΡ€Π°Ρ†Ρ–Π²Π½ΠΈΠΊΡ–Π².
    • ΠšΠΎΠΌΡ„ΠΎΡ€Ρ‚Π½ΠΈΠΉ старт: Π½Π° вас Ρ‡Π΅ΠΊΠ°Ρ” структурований процСс Π°Π΄Π°ΠΏΡ‚Π°Ρ†Ρ–Ρ— Ρ‚Π° ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΠΊΠ° ΠΌΠ΅Π½Ρ‚ΠΎΡ€Π°, який Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ швидко ΡƒΠ²Ρ–ΠΉΡ‚ΠΈ Π² курс справ.
    • ΠšΠΎΠ½ΠΊΡƒΡ€Π΅Π½Ρ‚Π½Ρ– ΡƒΠΌΠΎΠ²ΠΈ: ΠΎΡ„Ρ–Ρ†Ρ–ΠΉΠ½Π΅ ΠΏΡ€Π°Ρ†Π΅Π²Π»Π°ΡˆΡ‚ΡƒΠ²Π°Π½Π½Ρ, ΡΠΎΡ†Ρ–Π°Π»ΡŒΠ½Ρ– Π³Π°Ρ€Π°Π½Ρ‚Ρ–Ρ—, ΠΊΠΎΠ½ΠΊΡƒΡ€Π΅Π½Ρ‚Π½Π° Π·Π°Ρ€ΠΎΠ±Ρ–Ρ‚Π½Π° ΠΏΠ»Π°Ρ‚Π° Ρ‚Π° ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ ΠΏΡ€Π°Ρ†ΡŽΠ²Π°Ρ‚ΠΈ Π½Π°Π΄ Π½Π°ΠΉΠΌΠ°ΡΡˆΡ‚Π°Π±Π½Ρ–ΡˆΠΈΠΌΠΈ ΠΏΡ€ΠΎΡ”ΠΊΡ‚Π°ΠΌΠΈ ΠΊΡ€Π°Ρ—Π½ΠΈ.
    • ΠšΠΎΠΌΡ„ΠΎΡ€Ρ‚ Ρ‚Π° ΡƒΠΌΠΎΠ²ΠΈ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ: сучасний Π·Π°Ρ‚ΠΈΡˆΠ½ΠΈΠΉ офіс Ρƒ доступності Π΄ΠΎ ΠΌΠ΅Ρ‚Ρ€ΠΎ, ΠΎΠ±Π»Π°Π΄Π½Π°Π½ΠΈΠΉ укриттям Ρ‚Π° Π±Π΅Π·ΠΏΠ΅Ρ€Π΅Π±Ρ–ΠΉΠ½ΠΈΠΌ Ρ–Π½Ρ‚Π΅Ρ€Π½Π΅Ρ‚ΠΎΠΌ.

       

    Π”Ρ–Π·Π½Π°ΠΉΡ‚Π΅ΡΡŒ Π±Ρ–Π»ΡŒΡˆΠ΅ ΠΏΡ€ΠΎ Π½Π°ΡˆΡƒ Π΄Ρ–ΡΠ»ΡŒΠ½Ρ–ΡΡ‚ΡŒ Ρ‚Π° ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Ρƒ ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Ρƒ:

     

    • Π‘Π°ΠΉΡ‚
    • Instagram
    • Linkedin
    • Facebook

     

    Π”ΠΎΠ»ΡƒΡ‡ΠΈΠ²ΡˆΠΈΡΡŒ Π΄ΠΎ Π½Π°ΡˆΠΎΡ— ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π²ΠΈ ΠΎΡ‚Ρ€ΠΈΠΌΠ°Ρ”Ρ‚Π΅ шанс власноруч Ρ‚Π²ΠΎΡ€ΠΈΡ‚ΠΈ Ρ„ΡƒΠ½Π΄Π°ΠΌΠ΅Π½Ρ‚Π°Π»ΡŒΠ½Ρƒ Ρ€Π΅Ρ„ΠΎΡ€ΠΌΡƒ забСзпСчСння Π‘ΠΈΠ» ΠžΠ±ΠΎΡ€ΠΎΠ½ΠΈ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ Ρ– Π·Ρ€ΠΎΠ±ΠΈΡ‚ΠΈ свій внСсок для ΠΏΠ΅Ρ€Π΅ΠΌΠΎΠ³ΠΈ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ.

     

    Π“ΠΎΡ‚ΠΎΠ²Ρ– ΠΏΠ΅Ρ€Π΅Ρ‚Π²ΠΎΡ€ΠΈΡ‚ΠΈ свою СкспСртизу Π½Π° Ρ€Π΅Π°Π»ΡŒΠ½ΠΈΠΉ внСсок Π² ΠΏΠ΅Ρ€Π΅ΠΌΠΎΠ³Ρƒ? НадсилайтС Ρ€Π΅Π·ΡŽΠΌΠ΅ Π²ΠΆΠ΅ Π·Π°Ρ€Π°Π·!

     

    *Π—Π²Π΅Ρ€Ρ‚Π°Ρ”ΠΌΠΎ ΡƒΠ²Π°Π³Ρƒ: Π½Π°Π΄Ρ–ΡΠ»Π°Π²ΡˆΠΈ своє Ρ€Π΅Π·ΡŽΠΌΠ΅, Π²ΠΈ Π½Π°Π΄Π°Ρ”Ρ‚Π΅ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΡ‡Π½Ρƒ Π·Π³ΠΎΠ΄Ρƒ Π½Π° ΠΎΠ±Ρ€ΠΎΠ±ΠΊΡƒ Π²Π°ΡˆΠΈΡ… ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»ΡŒΠ½ΠΈΡ… Π΄Π°Π½ΠΈΡ… Π·Π³Ρ–Π΄Π½ΠΎ Π·Π°ΠΊΠΎΠ½Ρƒ.

     

    **ΠžΡΠΊΡ–Π»ΡŒΠΊΠΈ ΠΌΠΈ ΠΎΡ‚Ρ€ΠΈΠΌΡƒΡ”ΠΌΠΎ Π²Π΅Π»ΠΈΠΊΡƒ ΠΊΡ–Π»ΡŒΠΊΡ–ΡΡ‚ΡŒ Π²Ρ–Π΄Π³ΡƒΠΊΡ–Π², Π·Π²ΠΎΡ€ΠΎΡ‚Π½ΠΈΠΉ зв’язок Π±ΡƒΠ΄Π΅ Π½Π°Π΄Π°Π½ΠΎ лишС Ρ‚ΠΈΠΌ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ‚Π°ΠΌ, Ρ‡ΠΈΠΉ досвід Ρ‚Π° кваліфікація Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆΠ΅ Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π°ΡŽΡ‚ΡŒ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ вакансії.

    More
  • Β· 35 views Β· 1 application Β· 2d

    Security Analyst (Threat and Malware Analysis)

    Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· English - B1
    Локація: ΠšΠΈΡ—Π², Π³Ρ–Π±Ρ€ΠΈΠ΄Π½ΠΈΠΉ Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ. Fast Corporation - Ρ–Π·Ρ€Π°Ρ—Π»ΡŒΡΡŒΠΊΠ° ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ²Π° IT-компанія Π· офісами Π² Π†Π·Ρ€Π°Ρ—Π»Ρ– Ρ‚Π° Π£ΠΊΡ€Π°Ρ—Π½Ρ–, яка розробляє дСсктопні Π΄ΠΎΠ΄Π°Ρ‚ΠΊΠΈ Ρ‚Π° ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌΡƒ PC App Store для Tier-1 Ρ€ΠΈΠ½ΠΊΡ–Π². Ми ΠΏΡ€Π°Ρ†ΡŽΡ”ΠΌΠΎ Ρƒ сфСрі дистрибуції ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠ½ΠΎΠ³ΠΎ...

    Локація: ΠšΠΈΡ—Π², Π³Ρ–Π±Ρ€ΠΈΠ΄Π½ΠΈΠΉ Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ.

     

    Fast Corporation - Ρ–Π·Ρ€Π°Ρ—Π»ΡŒΡΡŒΠΊΠ° ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ²Π° IT-компанія Π· офісами Π² Π†Π·Ρ€Π°Ρ—Π»Ρ– Ρ‚Π° Π£ΠΊΡ€Π°Ρ—Π½Ρ–, яка розробляє дСсктопні Π΄ΠΎΠ΄Π°Ρ‚ΠΊΠΈ Ρ‚Π° ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌΡƒ PC App Store для Tier-1 Ρ€ΠΈΠ½ΠΊΡ–Π².

     

    Ми ΠΏΡ€Π°Ρ†ΡŽΡ”ΠΌΠΎ Ρƒ сфСрі дистрибуції ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠ½ΠΎΠ³ΠΎ забСзпСчСння, user acquisition Ρ‚Π° ΠΌΠΎΠ½Π΅Ρ‚ΠΈΠ·Π°Ρ†Ρ–Ρ—. Наша ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌΠ° ΠΏΠΎΡ”Π΄Π½ΡƒΡ” B2C Ρ– B2B напрямки, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡŽΡ‡ΠΈ користувачам Π·Π½Π°Ρ…ΠΎΠ΄ΠΈΡ‚ΠΈ Ρ‚Π° Π²ΡΡ‚Π°Π½ΠΎΠ²Π»ΡŽΠ²Π°Ρ‚ΠΈ Π΄ΠΎΠ΄Π°Ρ‚ΠΊΠΈ, Π° ΠΏΠ°Ρ€Ρ‚Π½Π΅Ρ€Π°ΠΌ - ΠΊΠ΅Ρ€ΡƒΠ²Π°Ρ‚ΠΈ Π΄ΠΈΡΡ‚Ρ€ΠΈΠ±ΡƒΡ†Ρ–Ρ”ΡŽ Ρ‚Π° Π΅Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½Ρ–ΡΡ‚ΡŽ ΠΊΠ°Π½Π°Π»Ρ–Π² залучСння.

     

    Ми приділяємо Π²Π΅Π»ΠΈΠΊΡƒ ΡƒΠ²Π°Π³Ρƒ якості ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ–Π², ΡΡ‚Π°Π±Ρ–Π»ΡŒΠ½ΠΎΡΡ‚Ρ– Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π΄ΠΎΠ΄Π°Ρ‚ΠΊΡ–Π² Ρ‚Π° ΠΊΠΎΡ€ΠΈΡΡ‚ΡƒΠ²Π°Ρ†ΡŒΠΊΠΎΠΌΡƒ досвіду. Нашими Ρ€Ρ–ΡˆΠ΅Π½Π½ΡΠΌΠΈ ΠΊΠΎΡ€ΠΈΡΡ‚ΡƒΡ”Ρ‚ΡŒΡΡ ΡˆΠΈΡ€ΠΎΠΊΠ° ΠΌΡ–ΠΆΠ½Π°Ρ€ΠΎΠ΄Π½Π° аудиторія, Π° ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌΠ° Ρ‰ΠΎΠ΄Π΅Π½Π½ΠΎ обробляє Π·Π½Π°Ρ‡Π½Ρ– обсяги інсталяцій Ρ– Ρ‚Ρ€Π°Ρ„Ρ–ΠΊΡƒ. Π‘Π΅Π·ΠΏΠ΅ΠΊΠ° Ρ‚Π° Ρ†Ρ–Π»Ρ–ΡΠ½Ρ–ΡΡ‚ΡŒ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠ½ΠΎΠ³ΠΎ забСзпСчСння для нас Ρ” ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΈΠΌΠΈ.

     

    ΠŸΡ€ΠΎ Ρ€ΠΎΠ»ΡŒ:

    Ми ΡˆΡƒΠΊΠ°Ρ”ΠΌΠΎ Security Analyst, який/яка Π±ΡƒΠ΄Π΅ займатися ΠΏΠ΅Ρ€Π΅Π²Ρ–Ρ€ΠΊΠΎΡŽ Π΄ΠΎΠ΄Π°Ρ‚ΠΊΡ–Π² Π½Π° Π½Π°ΡΠ²Π½Ρ–ΡΡ‚ΡŒ ΡˆΠΊΡ–Π΄Π»ΠΈΠ²ΠΎΡ— ΠΏΠΎΠ²Π΅Π΄Ρ–Π½ΠΊΠΈ, Π°Π½Π°Π»Ρ–Π·ΠΎΠΌ Ρ—Ρ… активності Ρƒ систСмі Ρ‚Π° допомогою Ρƒ виявлСнні ΠΏΠΎΡ‚Π΅Π½Ρ†Ρ–ΠΉΠ½ΠΈΡ… Ρ€ΠΈΠ·ΠΈΠΊΡ–Π² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

    Π¦Π΅ Ρ€ΠΎΠ»ΡŒ для людини, якій Ρ†Ρ–ΠΊΠ°Π²ΠΎ ΠΏΡ€Π°Ρ†ΡŽΠ²Π°Ρ‚ΠΈ Π· VM Ρ‚Π° Sandbox сСрСдовищами, Π°Π½Π°Π»Ρ–Π·ΠΎΠΌ ΠΏΠΎΠ²Π΅Π΄Ρ–Π½ΠΊΠΈ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌ Ρ– Π±Π°Π·ΠΎΠ²ΠΈΠΌΠΈ malware Ρ‚Π΅Ρ…Π½Ρ–ΠΊΠ°ΠΌΠΈ.

     

    Π§ΠΈΠΌ Ρ‚ΠΈ Π±ΡƒΠ΄Π΅Ρˆ Π·Π°ΠΉΠΌΠ°Ρ‚ΠΈΡΡŒ:

    • ΠŸΠ΅Ρ€Π΅Π²Ρ–Ρ€ΠΊΠ° ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌ Ρ‚Π° інсталСрів Π½Π° Π½Π°ΡΠ²Π½Ρ–ΡΡ‚ΡŒ ΡˆΠΊΡ–Π΄Π»ΠΈΠ²ΠΎΡ— активності.
    • Аналіз ΠΏΠΎΠ²Π΅Π΄Ρ–Π½ΠΊΠΈ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌ Ρƒ систСмі.
    • ΠŸΠ΅Ρ€Π΅Π²Ρ–Ρ€ΠΊΠ° Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΈΡ… підписів Ρ– цілісності Ρ„Π°ΠΉΠ»Ρ–Π².
    • Π‘Ρ‚Π°Ρ‚ΠΈΡ‡Π½ΠΈΠΉ Ρ‚Π° Π΄ΠΈΠ½Π°ΠΌΡ–Ρ‡Π½ΠΈΠΉ Π°Π½Π°Π»Ρ–Π· executables.
    • ΠœΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³ систСмної активності процСсів, слуТб, рСєстру Ρ‚Π° Ρ„Π°ΠΉΠ»ΠΎΠ²ΠΎΡ— систСми.
    • Аналіз ΠΌΠ΅Ρ€Π΅ΠΆΠ΅Π²ΠΎΡ— активності.
    • ВиявлСння ΠΏΡ–Π΄ΠΎΠ·Ρ€Ρ–Π»ΠΈΡ… Π°Π±ΠΎ Π½Π΅Π±Π΅Π·ΠΏΠ΅Ρ‡Π½ΠΈΡ… Π΄Ρ–ΠΉ.
    • Π ΠΎΠ±ΠΎΡ‚Π° Π· VM Ρ‚Π° Sandbox сСрСдовищами.
    • ДокумСнтування Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ–Π² Π°Π½Π°Π»Ρ–Π·Ρƒ Ρ‚Π° Π·Π½Π°ΠΉΠ΄Π΅Π½ΠΈΡ… Ρ€ΠΈΠ·ΠΈΠΊΡ–Π².
    • Взаємодія Π· командою Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠΈ.

     

    Що для нас ваТливо:

    • Π’Ρ–Π΄ 1 Ρ€ΠΎΠΊΡƒ досвіду Ρƒ сфСрі Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π°Π±ΠΎ strong security awareness, Π· ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΎΡŽ Π² Π°Π½Π°Π»Ρ–Π·Ρ– ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌ Ρ– ΠΏΠ΅Ρ€Π΅Π²Ρ–Ρ€Ρ†Ρ– Π½Π° Π·Π°Π³Ρ€ΠΎΠ·ΠΈ.
    • Розуміння ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ–Π² Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†Ρ–ΠΉΠ½ΠΎΡ— систСми Windows, Π·ΠΎΠΊΡ€Π΅ΠΌΠ° процСсів, слуТб, рСєстру Ρ‚Π° Ρ„Π°ΠΉΠ»ΠΎΠ²ΠΎΡ— систСми.
    • Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π· VM Π°Π±ΠΎ Sandbox Π±ΡƒΠ΄Π΅ плюсом.
    • Π‘Π°Π·ΠΎΠ²ΠΈΠΉ досвід Π°Π½Π°Π»Ρ–Π·Ρƒ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌ Π°Π±ΠΎ executables Π±ΡƒΠ΄Π΅ плюсом.
    • Π’ΠΏΠ΅Π²Π½Π΅Π½Π° Ρ€ΠΎΠ±ΠΎΡ‚Π° Π· інструмСнтами Procmon, Process Explorer, Autoruns, Wireshark, Sysmon, VirusTotal Π°Π±ΠΎ Π°Π½Π°Π»ΠΎΠ³Π°ΠΌΠΈ.
    • Розуміння Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΈΡ… підписів Ρ‚Π° Π±Π°Π·ΠΎΠ²ΠΈΡ… ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ–Π² PKI.
    • Розуміння Π±Π°Π·ΠΎΠ²ΠΈΡ… Ρ‚Π΅Ρ…Π½Ρ–ΠΊ malware Ρ– persistence.
    • Π‘Π°Π·ΠΎΠ²Ρ– Π½Π°Π²ΠΈΡ‡ΠΊΠΈ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π· PowerShell Π°Π±ΠΎ CMD.
    • ΠΠ½Π³Π»Ρ–ΠΉΡΡŒΠΊΠ° ΠΌΠΎΠ²Π° Ρ€Ρ–Π²Π΅Π½ΡŒ B1 Π°Π±ΠΎ Π²ΠΈΡ‰Π΅.

     

    Π’Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–Ρ— Ρ‚Π° інструмСнти:

    Windows, Procmon, Process Explorer, Autoruns, Wireshark, Sysmon, Threat intelligence tools (VirusTotal, Shodan, URLScan, theHarvester), VM, Sandbox, PowerShell, CMD.

     

    Π©ΠΎ ΠΌΠΈ ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”ΠΌΠΎ:

    • Бучасний офіс Ρƒ Π‘Π¦ Β«Π₯виля» біля ΠΌ. ΠŸΠ΅Ρ‡Π΅Ρ€ΡΡŒΠΊΠ° (ΠΎΠ½Π±ΠΎΡ€Π΄ΠΈΠ½Π³ Π² офісі Π΄ΠΎ 2 Ρ‚ΠΈΠΆΠ½Ρ–Π² щодня, Π½Π°Π΄Π°Π»Ρ– ΠΊΠΎΠΌΠ°Π½Π΄Π° Π·Π±ΠΈΡ€Π°Ρ”Ρ‚ΡŒΡΡ Π² офісі 1 Ρ€Π°Π· Π½Π° Ρ‚ΠΈΠΆΠ΄Π΅Π½ΡŒ).
    • Ѐіксований Π³Ρ€Π°Ρ„Ρ–ΠΊ 9:30–18:30, Π±Π΅Π· ΠΎΠ²Π΅Ρ€Ρ‚Π°ΠΉΠΌΡ–Π² Ρ– Π²Π΅Ρ‡Ρ–Ρ€Π½Ρ–Ρ… ΠΌΡ–Ρ‚ΠΈΠ½Π³Ρ–Π².
    • ΠžΠΏΠ»Π°Ρ‚Π° Π² $ Π½Π° ЀОП, Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π½ΠΎ Π΄ΠΎ Ρ‚Π²ΠΎΡ—Ρ… Π½Π°Π²ΠΈΡ‡ΠΎΠΊ Ρ– досвіду, Π±Π΅Π· Π·Π°Ρ‚Ρ€ΠΈΠΌΠΎΠΊ, компанія ΠΏΠΎΠΊΡ€ΠΈΠ²Π°Ρ” ΠΏΠΎΠ΄Π°Ρ‚ΠΊΠΈ Ρ‚Π° Π½Π°Π΄Π°Ρ” Π±ΡƒΡ…Π³Π°Π»Ρ‚Π΅Ρ€Π°.
    • Відпустка: 14 Ρ€ΠΎΠ±ΠΎΡ‡ΠΈΡ… Π΄Π½Ρ–Π², 10 лікарняних Π·Π° Π΄ΠΎΠ²Ρ–Π΄ΠΊΠΎΡŽ Ρ‚Π° 5 Π±Π΅Π· Π΄ΠΎΠ²Ρ–Π΄ΠΊΠΈ.
    • Π‘Ρ‚Π°Π±Ρ–Π»ΡŒΠ½Ρ–ΡΡ‚ΡŒ Ρƒ ΠΊΠΎΠΌΠ°Π½Π΄Ρ– - люди Π·Π°Π»ΠΈΡˆΠ°ΡŽΡ‚ΡŒΡΡ Π½Π°Π΄ΠΎΠ²Π³ΠΎ.
    • ПовнС Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½Π΅ забСзпСчСння (Π½ΠΎΡƒΡ‚Π±ΡƒΠΊ, ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€).
    • Π¦Ρ–ΠΊΠ°Π²Ρ– Π·Π°Π΄Π°Ρ‡Ρ– Ρƒ сфСрі Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ Ρ€ΠΎΠ·Π²ΠΈΠ²Π°Ρ‚ΠΈ СкспСртизу Ρƒ malware Π°Π½Π°Π»Ρ–Π·Ρ– Ρ‚Π° систСмній Π±Π΅Π·ΠΏΠ΅Ρ†Ρ–.
    • ΠœΡ–Π½Ρ–ΠΌΡƒΠΌ Π±ΡŽΡ€ΠΎΠΊΡ€Π°Ρ‚Ρ–Ρ—, ΡˆΠ²ΠΈΠ΄ΠΊΡ– Ρ€Ρ–ΡˆΠ΅Π½Π½Ρ Ρ‚Π° проста комунікація.
    More
Log In or Sign Up to see all posted jobs