Jobs Information Security
20-
Β· 234 views Β· 36 applications Β· 15d
Operations Manager (Payments)
Full Remote Β· Countries of Europe or Ukraine Β· 3 years of experience Β· English - B2Weβre seeking a highly experienced Payments Operations Manager with deep expertise across high-risk merchant processing, international banking workflows, and secure operational environments. This role requires a sharp, detail-driven operator who can...Weβre seeking a highly experienced Payments Operations Manager with deep expertise across high-risk merchant processing, international banking workflows, and secure operational environments.
This role requires a sharp, detail-driven operator who can manage sensitive financial documentation, ensure airtight compliance, and coordinate seamlessly with global payments partners.You will oversee mission-critical processes tied to MID acquisition, high-risk merchant onboarding, banking compliance, and the maintenance of multi-jurisdiction corporate structures. Precision, discretion, and exceptional operational discipline are essential.
What Youβll Do
- Monitor payment flows and detect anomalies
- Coordinate support, finance, and engineering teams
- Handle operational escalations and incidents
- Improve and document internal procedures
- Ensure smooth day-to-day operations across the payment stack
Youβll Be a Great Fit If
- Experience in fintech or payment operations
- Strong understanding of payment flows
- Excellent communication and coordination skills
- Problem-solver mindset
- Ability to work in fast-paced environments
Would Be a Plus
- Experience with high-risk payment processors (Rocketgate, Sticky.io, Konnektive, NMI, Authorize.net, Paynetics, etc.)
- Understanding of gateway routing, risk scoring, fraud controls, and merchant monitoring
- Ability to communicate with global banking partners (multilingual a bonus)
- Comfortable working within or close to the Dubai time zone
- Background in fast-paced, high-compliance environments
- Startup mindset β able to bring structure into evolving processes
What Youβll Have With Us
- Fully remote work
- High level of ownership
- Clear operational structure
- Supportive team with strong communication culture
More -
Β· 35 views Β· 3 applications Β· 8d
DevSecOps Engineer
Ukraine Β· Product Β· 3 years of experience Β· English - None Ukrainian Product πΊπ¦Our ideal candidate will possess: A βShift-Leftβ Mindset: A passion for integrating security early and throughout the CI/CD pipeline, not as an afterthought; Proficiency in Security Tooling: Hands-on experience with SAST, DAST, SCA, and IaC scanning...Our ideal candidate will possess:
- A βShift-Leftβ Mindset: A passion for integrating security early and throughout the CI/CD pipeline, not as an afterthought;
- Proficiency in Security Tooling: Hands-on experience with SAST, DAST, SCA, and IaC scanning tools, including within CI/CD platforms (e.g., Jenkins, GitLab CI, GitHub Actions);
- Cloud-Native Security Expertise: Extensive knowledge of securing cloud environments (AWS, Azure, and/or GCP) and containerized workloads (Docker, Kubernetes);
- Infrastructure as Code (IaC) Security: Strong experience auditing and securing infrastructure defined in Terraform, Ansible, or SaltStack;
- Scripting & Automation Mastery: Ability to automate security checks and remediations using scripting and software configuration management tools;
- Solid Foundational Knowledge and commercial experience in: web apps and infrastructure penetration testing, with a strong understanding of OWASP Top 10, network security, web application firewalls (WAF), and SIEM principles;
- Threat Modeling & Risk Assessment: Experience with threat modeling methodologies (e.g., STRIDE) to identify and mitigate risks during design phases;
- Collaborative Communication: Excellent communication skills to articulate security risks to engineers and leadership, fostering a culture of security awareness;
- Analytical Problem-Solving: Strong investigative and analytical skills to diagnose complex security issues in a dynamic environment.
Will be an advantage:
Industry certifications such as OSCP, ISO 27001, HTB, CompTIA Security+, CISSP, Microsoft, Cisco, AWS Security Specialty, or GIAC DevSecOps-related certs.
Requirements:
- Integrate security practices into DevOps pipelines (CI/CD) to enable secure software delivery;
- Implement, monitor, and improve security automation in infrastructure as code, build, and deployment processes;
- Handle information security incidents and support root cause analysis;
- Perform application and infrastructure penetration testing;
- Continuously perform vulnerability management process to improve resilience of corporate systems, applications, cloud, and container environments;
- Maintain PCI DSS related procedures;
- Develop, document, and enforce security policies, standards, and best practices;
- Maintain compliance with frameworks such as PCI DSS and support secure architecture design reviews;
- Build and manage secure environments for networks, storage, and cloud services using infrastructure as code;
- Champion DevSecOps culture across teams by advocating for shift-left security and security-as-code principles.
Required:
- Scanning tools within CI/CD platforms (e.g., Jenkins, GitLab CI, GitHub Actions, Nexpose, Nessus, Burpsuite, Owasp zap);
- Securing cloud environments (AWS, Amazon Detective, Azure, and/or GCP) and containerized workloads (Docker, Kubernetes);
- Auditing and securing infrastructure defined in Terraform, Ansible, or SaltStack.
- Scripting and software configuration management tools;
- OWASP Top 10, network security, web application firewalls (WAF), and SIEM principles;
- Threat modeling methodologies (e.g., STRIDE).
What we offer:
- Working in a stable company with more than 13-years history in the media market;
- The opportunity to participate in the creation of a service of the future;
- Free English lessons;
- Table tennis lessons;
- Corporate psychologist;
- Discounts from partner brands for company employees.
We donβt just want to be an employer β we want to be your employer of choice.
Weβd appreciate it if you could take a moment to fill out a short survey about what matters most to you. It will help us better understand candidatesβ expectations and create an even more comfortable environment at MEGOGO. Hereβs the link: bit.ly/43YaxBH
By responding to the vacancy and sending your CV to the Company (LLC βMEGOGOβ), registered and operating in accordance with the laws of Ukraine, registration number 38347009, address: Ukraine, 01011, Kyiv, Rybalska Street, building 22 (hereinafter βthe Companyβ), you confirm and agree that the Company processes your personal data presented in your CV in accordance with the Law of Ukraine βOn Personal Data Protectionβ and GDPR.
More -
Β· 40 views Β· 4 applications Β· 7d
Information Security Manager
Full Remote Β· EU Β· Product Β· 4 years of experience Β· English - NoneWe are looking for an Information Security Manager who will help mature our security culture, formalize internal processes, and lead the company toward continuous improvement of its security posture. You will collaborate with teams across the...We are looking for an Information Security Manager who will help mature our security culture, formalize internal processes, and lead the company toward continuous improvement of its security posture. You will collaborate with teams across the organization, develop security documentation, run awareness initiatives, and ensure a practical balance between strong security and fast-moving business operations in a fully remote and autonomous environment.
Requirements- 4+ years of experience in Information Security, preferably in Security Manager, ISO, GRC, or Compliance roles;
- Experience participating in an ISO 27001 certification process from start to finish;
- Strong knowledge of ISO 27001:2022, ISMS structure, risk management, and audit methodology;
- Excellent written and spoken English (Upper-Intermediate+);
- Experience preparing and maintaining security documentation;
- Strong communication and presentation skills;
- Ability to work independently and manage processes;
- Understanding of IT and cloud environments at a security governance level.
Nice to Have
- Experience delivering security awareness programs;
- Experience conducting internal audits;
- Familiarity with AWS, MS365, or cloud environments from a governance perspective;
- Knowledge of SOC2, NIST CSF, or GDPR frameworks;
General understanding of technical security areas (e.g., endpoint security, logging, identity security, cloud security principles), allowing future involvement in cross-functional security initiatives.
Personal Skills
- Strong analytical and communication skills;
- Ability to influence and engage employees in security improvements;
- High autonomy, ownership, and structured thinking;
- Ability to manage multiple processes simultaneously.
Benefits
Why Join Us?
π° Be part of the international iGaming industry β Work with a top European solution provider and shape the future of online gaming;
π A Collaborative Culture β Join a supportive and understanding team;
π° Competitive salary and bonus system β Enjoy additional rewards on top of your base salary;
π Unlimited vacation & sick leave β Because we prioritize your well-being;
π Professional Development β Access a dedicated budget for self-development and learning;
π₯ Healthcare coverage β Available for employees in Ukraine and compensation across the EU;
π« Mental health support β Free consultations with a corporate psychologist;
π¬π§ Language learning support β We cover the cost of foreign language courses;
π Celebrating Your Milestones β Special gifts for lifeβs important moments;
β³ Flexible working hours β Start your day anytime between 9:00-11:00 AM;
π’ Flexible Work Arrangements β Choose between remote, office, or hybrid work;
π₯ Modern Tech Setup β Get the tools you need to perform at your best;
π Relocation support β Assistance provided if you move to one of our hubs.
More -
Β· 165 views Β· 11 applications Β· 26d
OSINT Specialist
Office Work Β· Ukraine (Lviv) Β· Product Β· English - A2Our client is a Ukrainian company specializing in the development and production of products for security and defense needs. Their work combines engineering solutions, research, manufacturing, and analytics in an environment that demands reliability,...Our client is a Ukrainian company specializing in the development and production of products for security and defense needs. Their work combines engineering solutions, research, manufacturing, and analytics in an environment that demands reliability, confidentiality, and technological excellence.
Due to business expansion, we are looking for an OSINT Specialist to join the team. This role involves conducting comprehensive research based on open-source information. It requires working with sensitive data, a high level of responsibility, and strict adherence to internal security policies.
We welcome applications from experienced professionals as well as candidates who are just starting their careers and completed relevant courses, who are also eager to learn and grow with the team.
Key Responsibilities:
- Conduct in-depth OSINT research on companies, owners, beneficiaries, markets, technological niches, competitive environments, and political, geopolitical, and security-related events.
- Perform background checks on candidates during hiring and internal transfers.
- Verify potential contractors and partners before establishing business relationships.
- Monitor personnel reliability through analysis of open sources, media, registries, and social networks; identify collaboration risks, legal violations, and other factors that may cause financial or reputational harm.
- Ensure compliance with internal policies and procedures related to personnel and information security.
Requirements:
- Experience in OSINT or a basic understanding of the field.
- OSINT or cybersecurity certification is an advantage.
- Hands-on experience with tools and platforms for collecting and analyzing open-source information.
- Proficiency in working with databases and search engines.
- Strong communication skills and ability to work in a team.
- High level of responsibility, attention to detail, and organizational skills.
What the Company Offers:
- Official employment and competitive compensation.
- Possibility of military service deferment (reservation).
- 24 calendar days of paid vacation, sick leave, and full social benefits.
- A strong corporate culture and values that foster a comfortable and engaging work environment.
If you have relevant experience or a strong desire to develop in this field, please send us your resume. We will be happy to consider your application!
More -
Β· 18 views Β· 0 applications Β· 5d
Information Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· English - B2Delasport β Implementing Technological Solutions Here and Now. Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for...Delasport β Implementing Technological Solutions Here and Now.
Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for Sports Betting and Online Casino from a White-Label, with a full range of management services to a Plug&Play iFrame and a complete Turnkey. We are establishing an R&D center in Kyiv, and are looking for top talents to join our team.
This position requires full-time office work. Kyiv, 58 Yaroslavska str.
RESPONSIBILITIES
- Monitor compliance with information security and privacy policies at a technology company.
- Completing vendor security assessments and reviews.
- Reviewing security clauses in customer and vendor contracts.
- Providing, reviewing, and enhancing security training and awareness programs.
- Management of the organizationβs technological risk assessments.
- Helping security leaders to identify and assess risks of the organization and developing strategies to manage and mitigate these risks.
- Develop and implement best practices for assessing and evaluating IT and security controls for the organizationβs third-party businesses.
- Manage the penetration testing and technical risk assessments from end to end.
- Supporting the business with customer engagements, including attending customer calls and supporting our sales teams
REQUIREMENTS
- Minimum of 5 years of experience in a similar role in a technology/software/cloud organization
- Experience implementing and enforcing information security, regulatory, and privacy policies across the business.
- Acquaintance working with cyber security tools and products.
- Solid knowledge of information security principles and practices.
- Knowledge of risk management frameworks and industry compliance standards such as ISO 27001/ SOC2/ PCI DSS
- Excellent interpersonal skills and ability to work in a team with multiple interfaces.
- Experience working at SaaS provider company β an advantage.
- Fluent English
WHAT WE CAN OFFER YOU
- Modern office in Podil with an uninterruptible power supply and the Internet
- Personal time off (21 business days of paid vacation, paid days on special occasions, sick leaves, emergency days off)
- Public holidays
- Health and life insurance with our broker, available starting from the month following the employeeβs start date with the company
- Modern technical equipment
- English courses with native speakers
- Ukraine-based educational programs
- Sports activities reimbursement
- Corporate entertainments
- Happy hours on Fridays
- Gig contract support
-
Β· 66 views Β· 13 applications Β· 21d
IT Security Engineer
Full Remote Β· EU Β· Product Β· 3 years of experience Β· English - B2RISK inc: An International iGaming Company Pushing the Boundaries of Entertainment Who We Are: An international iGaming company specializing in identifying and fostering the growth of high-potential entertainment markets. With 1000+ professionals in 20+...RISK inc: An International iGaming Company Pushing the Boundaries of Entertainment
Who We Are:
An international iGaming company specializing in identifying and fostering the growth of high-potential entertainment markets. With 1000+ professionals in 20+ locations, we operate in 10 countries, serving over 300,000 customers.
Always Pushing the Boundaries? You Already Belong at RISK!
Our global-scale operations are based on strong internal expertise, analytics, and data research. We have expertise in iGaming operations (sports betting, online casino), digital and affiliate marketing, tech solutions, and data analytics.
In this role you will:
- Follow standard operating procedures to respond to real-time suspicious events from Antivirus, Endpoints, and Infrastructure systems.
- Evaluate and define security requirements and necessary settings for new systems and services before deployment.
- Actively participate in team projects focused on vulnerability management, system hardening, and security control deployment.
- Collaborate with various IT and operational teams to coordinate multi-team security projects and incident resolution efforts.
- Continuously apply and develop knowledge on network and systems security, security testing, and threat analysis.
Skills you will need to bring:
- Hands-on experience with EDR/AV (preferably Bitdefender): deployment, configuration, monitoring, incident handling.
- Firewall management (Fortigate): policy review, optimization, IPS/IDS, VPN, network hardening.
- DLP administration and basic WAF/perimeter protection knowledge.
- Vulnerability scanning and analysis (on-prem/cloud) + basic Web App Pentesting (OWASP Top 10).
- Experience with MDM tools (Jamf, Intune, SCCM, Google Workspace) and device security policies.
- Strong understanding of security fundamentals, Windows/Linux, and core protocols (TCP/IP, DNS, HTTP, TLS).
- Familiarity with scripting (Bash, Python, PowerShell).
- Strong communication skills, ownership, teamwork, and willingness to learn.
- English: Upper-Intermediate.
Additional Information
Our Benefit Cafeteria is Packed with Goodies:
- Children Allowance
- Mental Health Support
- Sport Activities
- Language Courses
- Automotive Services
- Veterinary Services
- Home Office Setup Assistance
- Dental Services
- Books and Stationery
- Training Compensation
- And yes, even Massage!
More -
Β· 123 views Β· 6 applications Β· 7d
Information Security Analyst
Full Remote Β· Ukraine Β· Product Β· 2 years of experience Β· English - B2Position Name: Information Security Analyst Reports to: Chief Information Security Officer Location/Type: Remote (UA Candidates only) Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge...Position Name: Information Security Analyst
Reports to: Chief Information Security Officer
Location/Type: Remote (UA Candidates only)Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge funds and other investment firms. Founded in 2016, we have grown year over year through our uncompromising focus on service.
We value ownership, execution, growth, intelligence, and camaraderie. We are looking for people who share our Core Values, thrive, and contribute to this environment while putting the customer first. At Atlas Technica, we offer a competitive salary, comprehensive benefits, and great perks to our global Team. We strive to maintain a professional yet friendly environment while promoting professional and career development for our Team Members. Join Atlas Technica now!
We seek a skilled Information Security Analyst to join our rapidly growing organization. This is a highly technical role providing excellent career development opportunities for the successful candidate. You will be work closely with the Chief Information Security Officer (CISO) and various teams to maintain and improve the security posture of Atlas and its clients. As a new position, this role will evolve, providing opportunities for growth and adaptation.
Responsibilities:
Vulnerability Management:
- Review vulnerability reports.
- Research scalable solutions for vulnerability remediation.
- Collaborate with Support/NOC to ensure remediations have minimal impact on clients and facilitate maintenance windows.
- Work with CS/Engineering to script and automate remediations.
- Track progress in ticketing system, including master tickets for multi-client initiatives and sub tickets for individual clients.
- Address vulnerabilities for clients' third-party vulnerability management, including overlap with Cavelo, and apply remedies to other clients.
Risk Management and Due Diligence:
- Provide accurate and timely responses to Due Diligence Questionnaires (DDQs).
- Review and analyze findings from risk assessments and penetration tests for Atlas and clients.
- Address identified vulnerabilities and recommend remediation strategies.
- Participate in Business Impact Analyses and tabletop exercises to enhance organizational resilience.
Industry Benchmark Alignment and Standards Updating:
- Start measuring alignment with Microsoft benchmarks in Intune and work on increasing the score.
- Address vulnerabilities and issues identified in workstation builds, cloud infrastructure configurations, and security configurations.
- Harden systems to enhance security across workstations, cloud infrastructure, and security configurations.
SOC 2 Maintenance and Additional Security Tasks:
- Perform test restores.
- Conduct reviews of our KnowBe4 phishing tests and training.
- Review SIEM logs.
- Assist in addressing cybersecurity incidents.
- Work with NOC and outsourced SOC on remediation runbooks.
Perform additional tasks as assigned to support the security team and organization.
Requirements:
β’ Strong understanding of cybersecurity principles and practices.
β’ Experience with vulnerability management and remediation.
β’ Familiarity with Microsoft Intune and security benchmarks.
β’ Excellent analytical and problem-solving skills.
β’ Ability to work collaboratively with cross-functional teams.
β’ Strong communication skills, both written and verbal.
β’ Strong ability to work independently.
β’ Experience with security tools (SIEM, IDS/IPS, vulnerability scanners).
β’ Experience with RMM/SOAR and other automation platforms.
β’ Experience scripting.
β’ Experience writing runbooks.Desirable Qualities:
β’ Experience working in an MSP environment (preferred, but not required).
More
β’ Relevant certifications (AZ-500, SC-900, SC-300, CompTIA Security+, etc.) -
Β· 50 views Β· 4 applications Β· 1d
Information security engineer
Ukraine Β· Product Β· 3 years of experience Β· English - B2Who weβ― are:β― RBI Retail Innovation is a product development company, a part of the group of Raiffeisen Bank International (Vienna, Austria). We are a stable company that works in the EU market. Now we have products in Poland. Our ambition will be...Who weβ― are:β―
RBI Retail Innovation is a product development company, a part of the group of Raiffeisen Bank International (Vienna, Austria). We are a stable company that works in the EU market. Now we have products in Poland. Our ambition will be widespread in EU countries in the next few years. Our projects include next-gen digital banking platformsβ design, delivery, and post-delivery activities. Our team is international but mainly consists of Ukrainian developers. We have offices in Kyiv and Rivne. Our mission is to provide seamless banking with ease and speed thatβs built for people. Our values are People First, Product Passion, and Trust.
About you:β―
- Atβ―least 3β―years ofβ―experience inβ―the information security field, including but not limitedβ―to: Web/Mobile Application Security, Cloud Security, Penetration Testing, Vulnerability Assessment, etc.
- Ability toβ―manually find and exploit basic web vulnerabilities
- Familiarity with OWASP Security Testing Guides, OWASP Top 10
- Knowledge and understanding ofβ―Application Security, Cloud Security (AWS), Authentication and Security protocols
- Strong communication troubleshooting skills
- Good English skills (Intermediate+)
- Self-disciplined
Will beβ―aβ―plus:
- Experience inβ―web/mobile development
- Relevance certifications such asβ―AWS Cloud Security, EC-Council CEH, Offensive Security: OSCP, OSWE, OSCE
- Security related publications, blog posts, and/or participation inβ―tools development
- BugBunty experience (please provide link toβ―your profile)
- Experience with various penetration testing tools (e.g., BurpSuite, Metasploit, OWASP ZAP)
You will:
Drive company application security and product improvements:
- Performing security assessment and internal penetration testing
- Working closely with Developers and DevOps onβ―promoting, clarification, and implementing leading security mechanisms inβ―the products and infrastructure
- Provide guidance onβ―secure system architecture (including cloud security) and software development processes aiming toβ―achieve best inβ―class security for our products
- Estimate application security risks and suggest mitigation strategies, maintain Threat Modeling
- Assess current application security posture against OWASP ASVS and MASVS
Drive vulnerability management including:
- Provide recommendation and best practice onβ―vulnerability remediation
- Facilitate, communicate, and assess mitigation steps
- Help key stakeholders toβ―understand the vulnerabilities
Participateβ―as (SME) subject matter expert inβ―security incidents assessment, analysis, and remediation.
What weβ―offer:β―
- You will beβ―aβ―part ofβ―global team ofβ―RBI Groupβ―β one ofβ―the leading banking groups inβ―Central and Eastern Europeβ―
- Anβ―opportunity toβ―work with some ofβ―the most talented and experienced people inβ―the Fintech industryβ―
- The ability toβ―drive change and innovation inβ―the products weβ―developβ―
- Official employment, gig-contractβ―
- Remote-first work modelβ―
- Competitive salaryβ―
- Personal and professional growth, corporate English coursesβ―
- Paid sick days-off and 20 working days of vacation per yearβ―
- Medical insuranceβ―
-
Β· 107 views Β· 5 applications Β· 22d
GRC Specialist
Full Remote Β· Ukraine Β· 1 year of experience Β· English - B2ΠΡΠΈΠ²ΡΡ, ΠΌΠΈ β ESKA, ΠΊΠΎΠΌΠ°Π½Π΄Π° Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ² Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΊΡ ΠΏΠ»Π°Π½ΡΡΡΡ, ΠΏΡΠΎΠ΅ΠΊΡΡΡΡΡ Ρ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΡΡ Π½Π°ΠΉΠ½Π°Π΄ΡΠΉΠ½ΡΡΡ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² Π£ΠΊΡΠ°ΡΠ½Ρ. Π 2014 ΡΠΎΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠΈ ESKA ΡΡΠΎΡΡΡ Π½Π° Π²Π°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠ° ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π°ΡΠΈΡ ΠΊΠ»ΡΡΠ½ΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ ΡΠ°...ΠΡΠΈΠ²ΡΡ,
ΠΌΠΈ β ESKA, ΠΊΠΎΠΌΠ°Π½Π΄Π° Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ² Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΊΡ ΠΏΠ»Π°Π½ΡΡΡΡ, ΠΏΡΠΎΠ΅ΠΊΡΡΡΡΡ Ρ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΡΡ Π½Π°ΠΉΠ½Π°Π΄ΡΠΉΠ½ΡΡΡ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² Π£ΠΊΡΠ°ΡΠ½Ρ. Π 2014 ΡΠΎΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠΈ ESKA ΡΡΠΎΡΡΡ Π½Π° Π²Π°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠ° ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π°ΡΠΈΡ ΠΊΠ»ΡΡΠ½ΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ ΡΠ° ΡΠ²ΡΡΡ.
Π―ΠΊΡΠΎ ΡΠ²ΠΎΡ ΠΏΡΠΈΡΡΡΠ°ΡΡΡ β Π΄Π±Π°ΡΠΈ ΠΏΡΠΎ Π·Π°Ρ ΠΈΡΡ Π΄Π°Π½ΠΈΡ Ρ ΡΠΈ Ρ ΠΎΡΠ΅Ρ Π±ΡΡΠΈ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΡΠΏΡΠ°Π²ΠΆΠ½ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΠΌΡΠ»ΠΈΠ²ΠΎ Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ Π½Π°ΠΌ ΡΠ²ΠΎΡ ΡΠ΅Π·ΡΠΌΠ΅.
Π©ΠΎ Π½Π° ΡΠ΅Π±Π΅ ΡΠ΅ΠΊΠ°Ρ Ρ Π½Π°Ρ?
ΠΠΎΠΌΠ°Π½Π΄Π° β Π² Π½Π°Ρ ΡΠΈ ΡΡΠ°Π½Π΅Ρ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΡΠΏΡΠ°Π²ΠΆΠ½ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ: ΠΏΡΠΎΡΡΠΈΡ , Π΄ΡΡΠ΅Π²Π½ΠΈΡ , ΡΠ΅ΡΠ½ΠΈΡ , Π²ΡΠ΄ΠΊΡΠΈΡΠΈΡ ΡΠ° Π·Π°Π²Π·ΡΡΠΈΡ Π»ΡΠ΄Π΅ΠΉ, ΡΠΊΡ Π²ΡΠ΄Π΄Π°Π½Ρ ΡΠ²ΠΎΡΠΉ ΡΠΏΡΠ°Π²Ρ;
ΠΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ β ΠΌΠΈ ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠ»ΡΠ΄ΠΊΡΡΠΌΠΎ Π·Π° Π½ΠΎΠ²ΠΈΠ½ΠΊΠ°ΠΌΠΈ ΡΠ²ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠ° ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π±Π΅ΡΠ΅ΠΌΠΎ Π² ΡΠΎΠ±ΠΎΡΡ Π½Π°ΠΉΠΊΡΠ°ΡΡ Π½ΠΎΠ²ΡΡΠ½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΈ, ΡΠΎ ΠΆ ΡΠΈ Π·Π°Π²ΠΆΠ΄ΠΈ Π±ΡΠ΄Π΅Ρ Π² Π³Π°ΡΠ½ΡΠΉ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΡΠΉ ΡΠΎΡΠΌΡ;
ΠΠ½ΡΡΠΊΡΡΡΡ β ΡΠ²ΡΡ Π·ΠΌΡΠ½ΡΡΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ, ΠΌΠΈ ΠΏΡΠ°Π³Π½Π΅ΠΌΠΎ ΡΡΡ Π°ΡΠΈΡΡ Π² ΡΠ°ΠΊΠΎΠΌΡ ΠΆ ΡΠΈΡΠΌΡ: Π»ΠΎΠΊΠ°ΡΡΡ, Π³ΡΠ°ΡΡΠΊΠΈ, ΠΏΡΠ΄Ρ ΠΎΠ΄ΠΈ, ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ. ΠΠΈ ΠΊΠΎΠΌΠ±ΡΠ½ΡΡΠΌΠΎ Π³Π½ΡΡΠΊΡΡΡΡ Π² ΠΏΡΠΎΡΠ΅ΡΠ°Ρ Π· ΠΆΠΎΡΡΡΠΊΡΡΡΡ Π²ΠΈΠΌΠΎΠ³ Π΄ΠΎ ΡΠΊΠΎΡΡΡ ΠΊΡΠ½ΡΠ΅Π²ΠΎΠ³ΠΎ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ.
Π‘ΡΠΎΠ³ΠΎΠ΄Π½Ρ, Π² Π·Π²βΡΠ·ΠΊΡ Π· ΡΠΎΠ·ΡΠΈΡΠ΅Π½Π½ΡΠΌ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΠΎΠΌ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π½Π° Π³Π»ΠΎΠ±Π°Π»ΡΠ½ΠΎΠΌΡ ΡΠΈΠ½ΠΊΡ, ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ GRC Specialist
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ?
- Π ΠΈΠ½ΠΊΠΎΠ²Ρ ΠΎΠΏΠ»Π°ΡΡ β ΡΡΠΊΡΠΎΠ²Π°Π½Π° ΡΠ°ΡΡΠΈΠ½Π°, ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½Ρ ΡΡΠ²Π½Ρ ΡΠ²ΠΎΠ³ΠΎ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΎΠ³ΠΎ Π΄ΠΎΡΠ²ΡΠ΄Ρ;
- ΠΡΡΡΠ½ΠΈΠΉ ΡΠΎΡΠΌΠ°Ρ ΡΠΎΠ±ΠΎΡΠΈ (Π³ΡΠ±ΡΠΈΠ΄ Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ) β Π· ΠΏΠΎΠ½Π΅Π΄ΡΠ»ΠΊΠ° ΠΏΠΎ ΠΏβΡΡΠ½ΠΈΡΡ Π· 09 Π΄ΠΎ 18.00;
- Π ΠΎΠ±ΠΎΡΠ° Π² ΡΡΠΊΠ°Π²ΠΈΡ ΠΏΡΠΎΠ΅ΠΊΡΠ°Ρ ;
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΠΎΡΠ»ΡΠ΄ΠΎΠ²Π½ΠΎ Π½Π°Π²ΡΠ°ΡΠΈΡΡ ΡΠ° ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ, ΠΏΡΠ΄Π²ΠΈΡΡΠ²Π°ΡΠΈ Π·Π½Π°Π½Π½Ρ ΡΠ° ΡΡΠ²Π΅Π½Ρ ΠΏΠΎΠ·ΠΈΡΡΡ;
- ΠΠΎΠ΄Π°ΡΠΊΠΎΠ²ΠΎ: Π²ΠΈΡ ΡΠ΄Π½Ρ ΡΠ° ΡΠ²ΡΡΠΊΠΎΠ²Ρ Π΄Π½Ρ, Π²ΡΠ΄ΠΏΡΡΡΠΊΠ° (24 Π΄Π½Ρ), ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ, ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΡΠ΅Ρ Π½ΡΠΊΠ°;
- ΠΠ°ΡΠΈΡΠ΅Π½Π΅ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π΅ ΠΆΠΈΡΡΡ;
Π©ΠΎ Π΄Π»Ρ Π½Π°Ρ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ?
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΡΠΉ Π±Π΅Π·ΠΏΠ΅ΡΡ Π²ΡΠ΄ 1 ΡΠΎΠΊΡ;
- ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Ρ Governance, Risk & Compliance (GRC) Π² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΡΠΉ Π±Π΅Π·ΠΏΠ΅ΡΡ: governance, risk management, compliance, third-party risk, incident/data security basics.
- ΠΠ½Π°Π½Π½Ρ ΡΠ° Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ²/ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΡΠ²: ISO/IEC 27001/27002, SOC 2, PCI DSS, NIST CSF, CIS Controls, DORA.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΡΠ· Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ ΡΠ° ΡΠ΅Π³ΡΠ»ΡΡΠΎΡΠΈΠΊΠΈ: GDPR, CCPA (ΡΠ° ΡΠ½ΡΠΈΡ ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½ΠΈΡ Π²ΠΈΠΌΠΎΠ³).
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ISMS (ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ, ΠΏΡΠΎΡΠ΅ΡΠΈ, ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ½Ρ Π·Π°Ρ ΠΎΠ΄ΠΈ, ΠΌΠ΅ΡΡΠΈΠΊΠΈ).
- ΠΠΎΡΠ²ΡΠ΄ Π²Π½ΡΡΡΡΡΠ½ΡΡ /Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ Π°ΡΠ΄ΠΈΡΡΠ² ΡΠ° ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠΈ Π΄ΠΎ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ/ΠΎΡΡΠ½ΠΎΠΊ ΠΊΠΎΠΌΠΏΠ»Π°ΡΠ½ΡΡ (ISO 27001, SOC 2, PCI DSS ΡΠΎΡΠΎ).
- ΠΠΌΡΠ½Π½Ρ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΈ ΡΠ° Π°ΠΊΡΡΠ°Π»ΡΠ·ΡΠ²Π°ΡΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ, ΠΏΡΠΎΡΠ΅Π΄ΡΡΠΈ, ΡΡΠ°Π½Π΄Π°ΡΡΠΈ, ΠΏΠ»Π°Π½ΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΡΠ²ΡΠ΄ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· ΠΊΠ»ΡΡΠ½ΡΠ°ΠΌΠΈ, ΠΏΡΠ΄ΡΡΠ΄Π½ΠΈΠΊΠ°ΠΌΠΈ ΡΠ° Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌΠΈ Π² ΡΠ°ΠΌΠΊΠ°Ρ GRC-ΠΏΡΠΎΡΠΊΡΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ/ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ security awareness.
- ΠΡΠΈΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ, ΡΠ²Π°ΠΆΠ½ΡΡΡΡ, problem-solving, ΠΎΡΠ³Π°Π½ΡΠ·ΠΎΠ²Π°Π½ΡΡΡΡ/ΡΠ°ΠΉΠΌ-ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ, ΡΠΈΠ»ΡΠ½Π° ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ.
ΠΡΠ΄Π΅ ΠΏΠ»ΡΡΠΎΠΌ: ΠΊΠΎΠ½ΡΠ°Π»ΡΠΈΠ½Π³; risk assessments ΡΠ° vendor/third-party risk; ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ ISO 27001 LI/LA, CISA/CRISC/CISSP/CISM; ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ GRC-ΡΠ½ΡΡΡΠ°ΡΠΈΠ²; English Upper-Intermediate+.
Π©ΠΎ Π±ΡΠ΄Π΅ Π²Ρ ΠΎΠ΄ΠΈΡΠΈ Π΄ΠΎ ΠΏΠ΅ΡΠ΅Π»ΡΠΊΡ ΡΠ²ΠΎΡΡ Π·Π°Π΄Π°Ρ?
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π²Π½ΡΡΡΡΠ½ΡΡΡ ΡΠ° Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ Π°ΡΠ΄ΠΈΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, SOC 2, PCI DSS, DORA, GDPR ΡΠ° ΡΠ½ΡΡ);
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ISMS Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ CIS Controls, NIST CSF, ISO 27002 ΡΠ° ΡΠ½ΡΠΈΡ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΡΠ²;
- ΠΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΡΠ° ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΡΠ² Π· ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΡΠΎΠ΄ΠΎ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π»Ρ ΠΊΠ»ΡΡΠ½ΡΡΠ²;
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ, ΠΏΡΠΎΡΠ΅Π΄ΡΡΠΈ, ΠΏΠ»Π°Π½ΠΈ, ΡΠΎΡΠΎ;
- ΠΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΡΠΎΠ»Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΠ° Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π»Ρ ΠΊΠ»ΡΡΠ½ΡΡΠ² Π· ΡΡΠ·Π½ΠΈΡ Π³Π°Π»ΡΠ·Π΅ΠΉ;
- ΠΠΎΠ½ΡΡΠ»ΡΡΠ°ΡΡΡ Π· ΠΏΠΈΡΠ°Π½Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ (GDPR, CCPA, ΡΠ° ΡΠ½ΡΡ);
- ΠΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ ΡΠΎΠ±ΠΎΡΠΈ Π· ΠΊΠ»ΡΡΠ½ΡΠ°ΠΌΠΈ ΡΠ° Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ²ΠΎΡΡΠ°ΡΠ½ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ²;
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ ΡΠ° Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡΠ² ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ GRC, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΏΡΠ΄ΡΡΠ΄Π½ΠΈΠΊΡΠ² Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ².
Π’ΠΎΠ±Ρ ΡΡΠΊΠ°Π²ΠΎ?
Π’ΠΈ Π±Π°ΡΠΈΡ ΡΠ΅Π±Π΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ?
Π’ΠΎ ΡΠΊΠΎΡΡΡΠ΅ Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ ΡΠ²ΠΎΡ ΡΠ΅Π·ΡΠΌΠ΅ ΡΠ° Π΄ΠΎ Π·ΡΡΡΡΡΡΡ :)
More -
Β· 46 views Β· 0 applications Β· 26d
Network Security Engineer
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· English - None Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠΈΠΌΠΎΠ³ΠΈ:
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°ΡΠΎΠ±ΡΠ² ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΠΏΠΎΠ΄ΡΠΉ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Ρ ΡΠΎΠ±ΠΎΡΠΈ Π· Splunk Security;
- ΠΠ½Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (NIST, ISO 27001, PCI DSS, PA DSS, CIS Controls v8, CSA Cloud Controls, SOC2, OWASP);
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ, SOC;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· IDS/IPS;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Π·Π°ΡΠΎΠ±ΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΡΠ½ΡΠ΅Π²ΠΈΡ ΡΠΎΡΠΎΠΊ (AV, EDR);
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΠΠ, ΡΠ°ΠΊΠΈΡ ΡΠΊ - IPSec, VPN. TLS, SSL, HTTPS, SSH, PKI;
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΠΈΠΏΡΠ² ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° Π·Π°ΡΠΎΠ±ΡΠ² ΡΡ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, Π»ΠΎΠΊΠ°Π»ΡΠ·Π°ΡΡΡ ΡΠ° ΠΏΡΠΎΡΠΈΠ΄ΡΡ.
ΠΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- Π Π΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- Π ΠΎΠ±ΠΎΡΠ° Π· ΡΡΠ·Π½ΠΈΠΌΠΈ Π΄ΠΆΠ΅ΡΠ΅Π»Π°ΠΌΠΈ ΠΏΠΎΠ΄ΡΠΉ, Π½Π°ΠΏΠΈΡΠ°Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΡΠΎΠ΄ΠΎ Π·Π±ΠΎΡΡ ΡΠ° Π½ΠΎΡΠΌΠ°Π»ΡΠ·Π°ΡΡΡ ΠΏΠΎΠ΄ΡΠΉ Ρ SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΠΊΠΎΡΠ΅Π»ΡΡΡΡ Π² SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ°ΡΡΠ΅ΡΡΠ² Π΄Π»Ρ Π½Π΅ΠΏΡΠ΄ΡΡΠΈΠΌΡΠ²Π°Π½ΠΈΡ Π΄ΠΆΠ΅ΡΠ΅Π» ΠΏΠΎΠ΄ΡΠΉ;
- Π ΠΎΠ·ΡΠΎΠ±Π»Π΅Π½Π½Ρ Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° Π² Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΌΡ ΡΡΠ°Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ², ΡΠΊΡ ΡΡΠΎΡΡΡΡΡΡΡ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- 12 sick days ΡΠ° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ;
- ΠΠΈΡ ΡΠ΄Π½ΠΈΠΉ Π² Π΄Π΅Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ;
- Π ΠΎΠ·Π²ΠΈΡΠΎΠΊ ΡΠ° Π½Π°Π²ΡΠ°Π½Π½Ρ Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠΌΡ ΡΠΎΠ·ΡΡΠ·Ρ;
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΉ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ Π΄Π»Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ;
- ΠΠ»Π°Π½ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡ.
- ΠΡΡΡ Π· Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΈΠΌ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΠΎΠΌ ΡΠ° Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ.
-
Β· 31 views Β· 3 applications Β· 26d
Identity Access Management Specialist
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· English - None Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠ΅ΠΎΠ±Ρ ΡΠ΄Π½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° Π½Π°Π²ΠΈΡΠΊΠΈ:
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ², ΡΠΎΠ·ΠΌΠ΅ΠΆΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΡ, ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Π΄ΠΎ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π°Π±ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° IDM\IAM-ΡΠΈΡΡΠ΅ΠΌ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π½Π° Π°Π½Π°Π»ΠΎΠ³ΡΡΠ½ΡΠΉ ΠΏΠΎΠ·ΠΈΡΡΡ Π²ΡΠ΄ 1 ΡΠΎΠΊΡ.
Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π·Π΄ΡΠΉΡΠ½ΡΡΡΡΡΡ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Ρ k8s, GitLab, Π±Π°Π·Π°Ρ Π΄Π°Π½ΠΈΡ , AWS.
ΠΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ Π±ΡΠ΄Π΅:
- ΠΠ°ΡΠ²Π½ΡΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ β Certified Access Management Specialist (CAMS)
ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ°, ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ.
- Π£ΡΠ°ΡΡΡ Π² Π°ΡΠ΄ΠΈΡΡ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ².
ΠΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- ΠΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ
- Π¦ΡΠΊΠ°Π²Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ, ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠ° ΠΊΠ°Ρ'ΡΡΠ½ΠΎΠ³ΠΎ Π·ΡΠΎΡΡΠ°Π½Π½Ρ;
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΡΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ;
- Π‘ΡΡΠ°ΡΠ½ΠΈΠΉ ΠΎΡΡΡ ΡΠ° ΠΊΠΎΠΌΡΠΎΡΡΠ½Π΅ ΡΠΎΠ±ΠΎΡΠ΅ ΠΌΡΡΡΠ΅;
- Π ΡΠ·Π½Ρ ΠΏΠ°ΠΊΠ΅ΡΠΈ ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΠΉ ΡΠ° Π±ΠΎΠ½ΡΡΡΠ² Π·Π°Π»Π΅ΠΆΠ½ΠΎ Π²ΡΠ΄ ΡΡΠΈΠ²Π°Π»ΠΎΡΡΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ, ΡΠ΅ΡΠ΅Π΄ ΡΠΊΠΈΡ : ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ Π΄ΠΎ ΡΡΡΠ½ΠΈΡΡ ΡΠΎΠ±ΠΎΡΠΈ, ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π΄ΠΈΡΡΠ°Π΄ΠΊΠ°.
-
Β· 38 views Β· 1 application Β· 21d
Security Project Manager
Ukraine Β· Product Β· 5 years of experience Β· English - NoneΠ‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ! MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ...Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ!
MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ ΠΠ΅Π½Π΅Π΄ΠΆΠ΅ΡΠ° Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π· ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΠ’ ΠΏΡΠΎΠ΅ΠΊΡΡΠ², ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΏΠ»Π°Π½ΡΠ²Π°Π½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΡΡΡΠ΅Π½Π½Ρ, ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡΠ² ΡΠ° ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ, Π°ΡΠ΄ΠΈΡΡ ΡΠ° ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΠΠ΅Π·ΠΏΠ΅ΠΊΠΈ (Π½Π°Π΄Π°Π»Ρ - ΠΠ).Π€ΡΠ½ΠΊΡΡΡ ΠΏΠΎΡΠ°Π΄ΠΈ:
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² ΠΠ Π² ΡΠ°ΠΌΠΊΠ°Ρ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΎΠ΅ΠΊΡΡΠ²
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΈ ΡΠ΅Ρ Π½ΡΡΠ½ΠΈΡ ΡΠ° Π±ΡΠ·Π½Π΅Ρ-ΡΡΡΠ΅Π½Ρ Π½Π° Π΅ΡΠ°ΠΏΡ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ°/Π°Π±ΠΎ Π΅ΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΡΡ Π½Π° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΡΡΡΡ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ ΠΠ
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠΎΡΠ΅ΡΡ Π· ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΠ
- Π£ΡΠ°ΡΡΡ Π² ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΠΠ
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΡΠΌΡΠ²Π°Π½Π½Ρ ΡΠ΄ΠΈΠ½ΠΈΡ Π²ΠΈΠΌΠΎΠ³ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄ΠΎ ΡΠΈΡΡΠ΅ΠΌ/ΡΠ΅ΡΠ²ΡΡΡΠ² ΠΠΎΠΌΠΏΠ°Π½ΡΡ
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΡΠ° ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π·Π°Ρ ΠΎΠ΄ΡΠ², ΡΠΏΡΡΠΌΠΎΠ²Π°Π½ΠΈΡ Π½Π° Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΎΠ³ΠΎ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΠΠΎΠΌΠΏΠ°Π½ΡΡ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ
ΠΠΎΠ½ΡΡΠ»ΡΡΡΠ²Π°Π½Π½Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π· ΠΏΠΈΡΠ°Π½Ρ ΠΠ
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠ±ΡΠ΄ΠΎΠ²ΡΠ²Π°Π½Π½Ρ ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΡΠΎΠ΅ΠΊΡΠ½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ, Π’Π, Π²ΠΈΠΌΠΎΠ³ΠΈ
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ ΡΠΈΠ·ΠΈΠΊΡΠ²
- ΠΡΡΠ½ΠΊΠ° ΡΠ° ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ, ΡΠ΅ΡΠ²Π΅ΡΡΠ², ΠΌΠ΅ΡΠ΅ΠΆ, Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Azure, AWS)
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ: VPN, MFA, PKI, SIEM, NAC, Π₯DR, DLP, WAF, IAM/IdM, CASB
- ΠΠ°Ρ ΠΈΡΡ ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ (Kubernetes, Docker), Π±Π΅Π·ΠΏΠ΅ΡΠ½Π΅ CI/CD
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ»Π°Π½ΡΠ² Π·Π½ΠΈΠΆΠ΅Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ² ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
- ΠΠ·Π°ΡΠΌΠΎΠ΄ΡΡ Π· Π°ΡΠ΄ΠΈΡΠΎΡΠ°ΠΌΠΈ (Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ/Π·ΠΎΠ²Π½ΡΡΠ½ΡΠΌΠΈ)
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°Π±ΠΎ ΡΡΠ°ΡΡΡ Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΊΠ°Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌ ΠΠ
- ΠΠ»ΠΈΠ±ΠΎΠΊΡ Π·Π½Π°Π½Π½Ρ Π² ΠΎΠ±Π»Π°ΡΡΡ ΡΡΠ΅Π½Π΄ΡΠ² ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ·, Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΈΡ ΡΠ½Π΄ΠΈΠΊΠ°ΡΠΎΡΡΠ² ΠΊΠΎΠΌΠΏΡΠΎΠΌΠ΅ΡΠ°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΈΡ ΡΠΏΠΎΡΠΎΠ±ΡΠ² ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ·
- ΠΠ½Π°Π½Π½Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ, ΡΠΎ ΡΠ΅Π³Π»Π°ΠΌΠ΅Π½ΡΡΡΡΡ ΠΏΠΈΡΠ°Π½Π½Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ (ΡΠ΅ΡΡΡ: ISO, NIST)
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ² ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡ, Π°Π»Π³ΠΎΡΠΈΡΠΌΡΠ² ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π· Π²ΡΠ΄ΠΊΡΠΈΡΠΈΠΌ ΡΠ° Π·Π°ΠΊΡΠΈΡΠΈΠΌ ΠΊΠ»ΡΡΠ΅ΠΌ
- ΠΠ½Π°Π½Π½Ρ Π±Π°Π·ΠΎΠ²ΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Π‘Π»ΡΠΆΠ±Π° ΠΊΠ°ΡΠ°Π»ΠΎΠ³ΡΠ², DNS, DHCP, Π€Π°ΠΉΠ»ΠΎΠ²Ρ ΡΠ΅ΡΠ²Π΅ΡΠΈ)
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ Zero Trust, defense-in-depth, risk-based approach
- ΠΠ½Π°Π½Π½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π²ΡΡΡΡΠ°Π»ΡΠ·Π°ΡΡΡ Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (VMware)
- ΠΠ½Π°Π½Π½Ρ Π±Π°Π·ΠΎΠ²ΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Π‘Π»ΡΠΆΠ±Π° ΠΊΠ°ΡΠ°Π»ΠΎΠ³ΡΠ², DNS, DHCP, Π€Π°ΠΉΠ»ΠΎΠ²Ρ ΡΠ΅ΡΠ²Π΅ΡΠΈ)
- ΠΠ±ΡΠΈΡΠ»ΡΠ²Π°Π»ΡΠ½Ρ ΠΌΠ΅ΡΠ΅ΠΆΡ ΡΠ° ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ: ΠΎΡΠ½ΠΎΠ²ΠΈ ΡΠΎΠΏΠΎΠ»ΠΎΠ³ΡΡ ΠΌΠ΅ΡΠ΅ΠΆ, ΠΎΡΠ½ΠΎΠ²Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ ΡΡΠ΅ΠΊΠ° TCP/IP (IP, TCP, UDP, HTTP/HTTPs)
ΠΠΎΠ½ΡΠ΅ΠΏΡΡΡ API (REST, gRPC, GraphQL)
Π£ΠΏΡΠ°Π²Π»ΡΠ½ΡΡΠΊΡ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠ½Π°Π»ΡΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ ΡΠ° Π·Π΄Π°ΡΠ½ΡΡΡΡ Π²ΠΈΡΡΡΡΠ²Π°ΡΠΈ ΡΠΊΠ»Π°Π΄Π½Ρ ΡΠ΅Ρ Π½ΡΡΠ½Ρ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈ
- ΠΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ° ΠΊΠΎΠΌΡΠ½ΡΠΊΡΠ²Π°ΡΠΈ Π· ΡΡΠ·Π½ΠΈΠΌΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»Π°ΠΌΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ
- ΠΡΠ³Π°Π½ΡΠ·ΠΎΠ²Π°Π½ΡΡΡΡ ΡΠ° ΡΠ²Π°Π³Π° Π΄ΠΎ Π΄Π΅ΡΠ°Π»Π΅ΠΉ ΠΏΡΠΈ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΠ°ΠΌΠΈ ΡΠ° ΠΊΠ»ΡΡΠ°ΠΌΠΈ
ΠΠ΄Π°ΡΠ½ΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ Π°Π΄Π°ΠΏΡΡΠ²Π°ΡΠΈΡΡ Π΄ΠΎ Π½ΠΎΠ²ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ²
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City, Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ)
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More -
Β· 40 views Β· 2 applications Β· 22d
Account Manager
Office Work Β· Poland Β· Product Β· 1 year of experience Β· English - B2Π¨ΡΠΊΠ°ΡΠΌΠΎ ΡΠ²Π°ΠΆΠ½ΠΎΠ³ΠΎ ΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΎΠ³ΠΎ Account Manager β Π»ΡΠ΄ΠΈΠ½Ρ, ΡΠΊΠ° ΡΡΠΈΠΌΠ°Ρ Π²ΡΡ Π°ΠΊΠ°ΡΠ½ΡΠΈ ΠΏΡΠ΄ ΠΊΠΎΠ½ΡΡΠΎΠ»Π΅ΠΌ Ρ Π·Π½Π°Ρ, ΡΠΊ Π·ΡΠΎΠ±ΠΈΡΠΈ Ρ Π°ΠΎΡ Π²ΠΏΠΎΡΡΠ΄ΠΊΠΎΠ²Π°Π½ΠΈΠΌ. Π―ΠΊΡΠΎ ΡΠΈ Π»ΡΠ±ΠΈΡ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡ, ΡΠ°Π±Π»ΠΈΡΡ, Π»ΠΎΠ³ΡΠΊΡ ΡΠ° ΠΌΠ°ΡΡ ΠΎΠΊΠΎ Π½Π° Π΄Π΅ΡΠ°Π»Ρ β ΡΡ ΡΠΎΠ»Ρ ΡΠΎΡΠ½ΠΎ Π΄Π»Ρ ΡΠ΅Π±Π΅ InOvation β ΠΌΠΈ...Π¨ΡΠΊΠ°ΡΠΌΠΎ ΡΠ²Π°ΠΆΠ½ΠΎΠ³ΠΎ ΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΎΠ³ΠΎ Account Manager β Π»ΡΠ΄ΠΈΠ½Ρ, ΡΠΊΠ° ΡΡΠΈΠΌΠ°Ρ Π²ΡΡ Π°ΠΊΠ°ΡΠ½ΡΠΈ ΠΏΡΠ΄ ΠΊΠΎΠ½ΡΡΠΎΠ»Π΅ΠΌ Ρ Π·Π½Π°Ρ, ΡΠΊ Π·ΡΠΎΠ±ΠΈΡΠΈ Ρ Π°ΠΎΡ Π²ΠΏΠΎΡΡΠ΄ΠΊΠΎΠ²Π°Π½ΠΈΠΌ. Π―ΠΊΡΠΎ ΡΠΈ Π»ΡΠ±ΠΈΡ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡ, ΡΠ°Π±Π»ΠΈΡΡ, Π»ΠΎΠ³ΡΠΊΡ ΡΠ° ΠΌΠ°ΡΡ ΠΎΠΊΠΎ Π½Π° Π΄Π΅ΡΠ°Π»Ρ β ΡΡ ΡΠΎΠ»Ρ ΡΠΎΡΠ½ΠΎ Π΄Π»Ρ ΡΠ΅Π±Π΅
InOvation β ΠΌΠΈ ΡΠ΅ΠΊΡΡΡΠΈΠ½Π³ΠΎΠ²Π° Π°Π³Π΅Π½ΡΡΡ ΠΏΠΎΠ²Π½ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ, ΡΠΊΠ° Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡΠΌ Π·Π½Π°Ρ ΠΎΠ΄ΠΈΡΠΈ ΡΠ΄Π΅Π°Π»ΡΠ½ΠΈΠΉ ΠΌΠ΅ΡΡ Π· Π»ΡΠ΄ΡΠΌΠΈ. ΠΠΈ Π²ΡΡΠΈΠΌΠΎ, ΡΠΎ ΡΠΎΠ±ΠΎΡΠ° β ΡΠ΅ Π½Π΅ Π»ΠΈΡΠ΅ Π·Π°Π΄Π°ΡΡ, Π° ΠΉ Π³Π°ΡΠΌΠΎΠ½ΡΡ ΠΌΡΠΆ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ, ΡΠΎΠ·Π²ΠΈΡΠΊΠΎΠΌ Ρ ΡΡΠ½Π½ΠΎΡΡΡΠΌΠΈ
ΠΠ°Ρ ΠΠ»ΡΡΠ½Ρ
ΠΠΎΠΌΠ°Π½Π΄Π° - Π΄Π΅ ΠΊΠΎΠΆΠ΅Π½ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊ ΠΌΠΎΠΆΠ΅ Π½Π΅ ΡΡΠ»ΡΠΊΠΈ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ, Π°Π»Π΅ ΠΉ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ, ΠΎΡΡΠΈΠΌΡΡΡΠΈ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ ΡΠ° ΡΡΠ½ΡΡΡΠΈ Π²Π»Π°ΡΠ½ΠΈΠΉ Π±Π°Π»Π°Π½Ρ ΠΌΡΠΆ ΡΠΎΠ±ΠΎΡΠΎΡ ΡΠ° ΠΎΡΠΎΠ±ΠΈΡΡΠΈΠΌ ΠΆΠΈΡΡΡΠΌ. ΠΡΡΡΡΡ Π² ΡΠΈΠ»Ρ ΠΊΠ°ΠΉΠ΄Π·Π΅Π½ β ΠΏΠΎΡΡΡΠΉΠ½Π΅ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»Π΅Π½Π½Ρ, Π° ΡΠ°ΠΊΠΎΠΆ Ρ ΠΊΠΎΠΌΠ°Π½Π΄Π½Ρ ΡΠΎΠ±ΠΎΡΡ, Π΄Π΅ Π½ΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ ΠΏΡΠΈΠ½ΠΎΡΡΡΡ ΡΠ½ΡΠΊΠ°Π»ΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° ΡΠΏΡΠΈΡΡΡΡ ΠΎΡΠΎΠ±ΠΈΡΡΡΡΠ½ΠΎΠΌΡ ΡΠΎΡΡΡ
Π‘ΡΡΠ°ΡΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π°, ΡΠΊΠ° ΡΡΠ½ΡΡ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΡΡΡΡ ΡΠ° ΠΏΡΠΎΠ·ΠΎΡΡ ΠΏΡΠΎΡΠ΅ΡΠΈ. Π’ΡΡ Π²Π°ΠΆΠ»ΠΈΠ²Π° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ, ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡ Ρ Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π²Π΅Π»ΠΈΠΊΠΈΠΌΠΈ ΠΎΠ±ΡΡΠ³Π°ΠΌΠΈ Π΄Π°Π½ΠΈΡ . ΠΠΎΠ½ΠΈ ΡΡΠΊΠ°ΡΡΡ ΡΠ°Ρ ΡΠ²ΡΡ, ΡΠΊΠΈΠΉ Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ ΡΡΠΈΠΌΠ°ΡΠΈ ΠΏΡΠ΄ ΠΊΠΎΠ½ΡΡΠΎΠ»Π΅ΠΌ ΡΡΡ Π°ΠΊΠ°ΡΠ½ΡΠΈ, Π΄ΠΎΡΡΡΠΏΠΈ ΡΠ° Π²Π½ΡΡΡΡΡΠ½Ρ ΡΠΈΡΡΠ΅ΠΌΠΈ β ΡΠΎΠ± ΠΊΠΎΠΆΠ΅Π½ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊ ΠΌΡΠ³ ΡΠ²ΠΈΠ΄ΠΊΠΎ ΡΡΠ°ΡΡΡΠ²Π°ΡΠΈ ΠΉ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ
Π―ΠΊΡ Π·Π°Π΄Π°ΡΡ Π±ΡΠ΄Π΅Ρ ΡΠΎΠ±ΠΈΡΠΈ:
β ΡΡΠ²ΠΎΡΡΠ²Π°ΡΠΈ Π°ΠΊΠ°ΡΠ½ΡΠΈ Π΄Π»Ρ Π½ΠΎΠ²ΠΈΡ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² (Telegram, ΠΏΠΎΡΡΠ°, ΡΠΎΡΠΌΠ΅ΡΠ΅ΠΆΡ)
β Π²Π΅ΡΡΠΈ ΠΎΠ±Π»ΡΠΊ Π΄ΠΎΡΡΡΠΏΡΠ² Ρ Π²Π½ΡΡΡΡΡΠ½ΡΠΉ CRM
β ΡΡΠ²ΠΎΡΡΠ²Π°ΡΠΈ Π΄ΠΎΠ΄Π°ΡΠΊΠΎΠ²Ρ Π°ΠΊΠ°ΡΠ½ΡΠΈ Π·Π° Π·Π°ΠΏΠΈΡΠΎΠΌ
β Π²ΡΠ΄Π½ΠΎΠ²Π»ΡΠ²Π°ΡΠΈ Π°Π±ΠΎ ΡΠΎΠ·Π±Π»ΠΎΠΊΠΎΠ²ΡΠ²Π°ΡΠΈ Π΄ΠΎΡΡΡΠΏ Π΄ΠΎ Π°ΠΊΠ°ΡΠ½ΡΡΠ²
β ΡΠΈΡΡΠ΅ΠΌΠ°ΡΠΈΠ·ΡΠ²Π°ΡΠΈ ΡΠ° ΠΎΠ½ΠΎΠ²Π»ΡΠ²Π°ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ Π½ΠΎΠΌΠ΅ΡΠΈ ΠΉ SIM-ΠΊΠ°ΡΡΠΈΠ©ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ Π΄Π»Ρ ΡΡΡΡ ΡΠΎΠ»Ρ:
β ΡΠ²Π°ΠΆΠ½ΡΡΡΡ, ΡΡΡΡΠΊΡΡΡΠ½ΡΡΡΡ, Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π²Π΅Π»ΠΈΠΊΠΈΠΌ ΠΎΠ±ΡΡΠ³ΠΎΠΌ ΠΏΠΎΠ²ΡΠΎΡΡΠ²Π°Π½ΠΈΡ Π·Π°Π΄Π°Ρ
β Π°Π½Π°Π»ΡΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ ΡΠ° Π·Π΄Π°ΡΠ½ΡΡΡΡ ΠΏΠΎΠΌΡΡΠ°ΡΠΈ ΠΏΠΎΠΌΠΈΠ»ΠΊΠΈ
β Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Excel ΡΠ° Π· ΡΠΎΡΠΌΠ΅ΡΠ΅ΠΆΠ°ΠΌΠΈ
β Π²ΠΏΠ΅Π²Π½Π΅Π½ΠΈΠΉ ΠΊΠΎΡΠΈΡΡΡΠ²Π°Ρ ΠΠβΠ²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ Ρ ΡΡΡΠ΅ΡΠΎΡΡΡΠΉΠΊΡΡΡΡ
β Π²ΠΈΡΠ° ΠΎΡΠ²ΡΡΠ° Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡΠΠ΅ΡΠ΅Π²Π°Π³ΠΈ ΡΠΎΠ±ΠΎΡΠΎΠ΄Π°Π²ΡΡ:
β ΡΡΠ°Π±ΡΠ»ΡΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π°, ΡΠΊΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΡΡ Ρ Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°Ρ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ
β ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΊΡΡΡΡΠ² Π΄Π»Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡβ benefit Ρafe: Π°Π½Π³Π»ΡΠΉΡΡΠΊΠ°, ΡΠΏΠΎΡΡ, ΠΌΠ°ΡΠ°ΠΆ ΡΠΈ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³
β ΠΌΠ΅Π΄ΡΡΡΠ°Ρ ΠΎΠ²ΠΊΠ° Π΄Π»Ρ ΡΠΏΠΎΠΊΠΎΡ ΡΠ° Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ CRM ΡΠ° ΡΡ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡΠ²Π°ΡΠΈ
β ΡΠΎΠ±ΠΎΡΠ°, Π΄Π΅ ΡΡΠ½ΡΡΡΡ ΡΠΎΡΠ½ΡΡΡΡ Ρ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡΠ―ΠΊΡΠΎ ΡΠΈ Π²ΡΠ΄ΡΡΠ²Π°ΡΡ, ΡΠΎ ΡΠ΅ ΠΏΡΠΎ ΡΠ΅Π±Π΅ β Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ ΡΠ΅Π·ΡΠΌΠ΅ + ΠΊΡΠ»ΡΠΊΠ° ΡΠ»ΡΠ² ΠΏΡΠΎ ΡΠ΅Π±Π΅
More -
Β· 34 views Β· 1 application Β· 12d
Red Team Engineer
Hybrid Remote Β· Ukraine Β· 3 years of experience Β· English - NoneΠΡΠΈΠ²ΡΡ! ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ Red Team Engineer Π΄Π»Ρ ΡΠΎΠ·Π²ΠΈΡΠΊΡ Ρ ΠΏΠΎΡΠΈΠ»Π΅Π½Π½Ρ ΡΡΠ½ΡΡΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ Π½Π°ΠΏΡΡΠΌΠΊΡ Red Team. Π’Π²ΠΎΡΠΌΠΈ Π·Π°Π²Π΄Π°Π½Π½ΡΠΌΠΈ Π±ΡΠ΄ΡΡΡ: ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ red teaming Π°ΠΊΡΠΈΠ²Π½ΠΎΡΡΠ΅ΠΉ, ΡΠΎ ΠΎΡ ΠΎΠΏΠ»ΡΡΡΡ ΠΏΠΎΠ²Π½ΠΈΠΉ ΡΠΈΠΊΠ» β Π²ΡΠ΄ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΡΠ»ΡΠ²Π°Π½Π½Ρ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΠΉ Π΄ΠΎ...ΠΡΠΈΠ²ΡΡ!
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ Red Team Engineer Π΄Π»Ρ ΡΠΎΠ·Π²ΠΈΡΠΊΡ Ρ ΠΏΠΎΡΠΈΠ»Π΅Π½Π½Ρ ΡΡΠ½ΡΡΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ Π½Π°ΠΏΡΡΠΌΠΊΡ Red Team.
Π’Π²ΠΎΡΠΌΠΈ Π·Π°Π²Π΄Π°Π½Π½ΡΠΌΠΈ Π±ΡΠ΄ΡΡΡ:- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ red teaming Π°ΠΊΡΠΈΠ²Π½ΠΎΡΡΠ΅ΠΉ, ΡΠΎ ΠΎΡ ΠΎΠΏΠ»ΡΡΡΡ ΠΏΠΎΠ²Π½ΠΈΠΉ ΡΠΈΠΊΠ» β Π²ΡΠ΄ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΡΠ»ΡΠ²Π°Π½Π½Ρ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΠΉ Π΄ΠΎ Π²ΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ ΡΡΠ»Π΅ΠΉ Π°ΡΠ°ΠΊΠΈ ΡΠ° ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π³ΡΠ°ΡΡΠ² ΡΡΠ΅Π½Π°ΡΡΡΠ² Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡΠ½ΠΎΠ³ΠΎ ΠΏΠ»Π°Π½ΡΠ²Π°Π½Π½Ρ.
- ΠΠ° Π΅ΡΠ°ΠΏΡ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π²ΠΈ Π²ΠΈΠΊΠΎΠ½ΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ ΠΎΠΏΠ΅ΡΠ°ΡΡΡ Π·Π³ΡΠ΄Π½ΠΎ Π· ΠΏΠ»Π°Π½ΠΎΠΌ, ΡΠΎΠ± Π΄ΠΎΡΡΠ³ΡΠΈ Π²ΠΈΠ·Π½Π°ΡΠ΅Π½ΠΈΡ ΡΡΠ»Π΅ΠΉ, Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΠΈ ΡΡΠ·Π½Ρ Π²Π΅ΠΊΡΠΎΡΠΈ Π°ΡΠ°ΠΊ: ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²Ρ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ, Π²Π΅Π±Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΡΡΠ·ΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΡΡΠΏ, ΡΠΎΡΡΠ°Π»ΡΠ½Ρ ΡΠ½ΠΆΠ΅Π½Π΅ΡΡΡ ΡΠ° ΡΠ½ΡΡ ΠΌΠ΅ΡΠΎΠ΄ΠΈ.
- ΠΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ Π· Π·Π°ΠΌΠΎΠ²Π½ΠΈΠΊΠ°ΠΌΠΈ
- ΠΠ°ΠΏΠΈΡΠ°Π½Π½Ρ Π·Π²ΡΡΡΠ²
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Security Awareness Π΄Π»Ρ ΠΠ°ΠΌΠΎΠ²Π½ΠΈΠΊΡΠ²
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΠ·Π²ΠΈΡΠΊΡ SaaS ΠΏΡΠΎΠ΄ΡΠΊΡΡ
Π©ΠΎ ΠΌΠΈ ΠΎΡΡΠΊΡΡΠΌΠΎ Π²ΡΠ΄ ΡΠ΅Π±Π΅:- 3 ΡΠΎΠΊΠΈ Π΄ΠΎΡΠ²ΡΠ΄Ρ Π² ΡΡΠ΅ΡΡ Π½Π°ΡΡΡΠΏΠ°Π»ΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ΡΡΠ°ΡΡΡ Ρ ΡΡΠ·Π½ΠΈΡ ΠΏΡΠΎΡΠΊΡΠ°Ρ Π· Π΅ΠΌΡΠ»ΡΡΡΡ Π΄ΡΠΉ Π·Π»ΠΎΠ²ΠΌΠΈΡΠ½ΠΈΠΊΡΠ² (red teaming ΡΠ° purple teaming) Π΄Π»Ρ ΠΊΠ»ΡΡΠ½ΡΡΠ² ΡΠ· ΡΡΠ·Π½ΠΈΡ Π³Π°Π»ΡΠ·Π΅ΠΉ.
- ΠΠΊΡΠΏΠ΅ΡΡΠΈΠ·Π° Ρ ΡΡΠ΅ΡΡ Π΅ΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΡΡ Windows Active Directory ΡΠ° Π·Π΄ΡΠΉΡΠ½Π΅Π½Π½Ρ lateral movement Π² ΠΌΠ΅ΡΠ΅ΠΆΡ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· c2 ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΠ°ΠΌΠΈ(Sliver, Cobalt Strike, Havoc, ΡΠΎΡΠΎ)
- ΠΠΎΡΠ²ΡΠ΄ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ΅Ρ Π½ΡΠΊ ΠΎΠ±Ρ ΠΎΠ΄Ρ EDR-ΡΠΈΡΡΠ΅ΠΌ (Endpoint Detection and Response).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π²Π»Π°ΡΠ½ΠΈΡ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Ρ ΠΏΠ΅ΠΉΠ»ΠΎΠ°Π΄ΡΠ², Π° ΡΠ°ΠΊΠΎΠΆ ΡΠ΅Π²Π΅ΡΡ-ΡΠ½ΠΆΠΈΠ½ΡΡΠΈΠ½Π³Ρ
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΡΡΠΈΠ½Π³ΠΎΠ²ΠΈΡ ΠΊΠ°ΠΌΠΏΠ°Π½ΡΠΉ
- ΠΠΎΡΠ²ΡΠ΄ Π· MITRE ATT&CK Framework.
- Π£ΡΠ°ΡΡΡ Ρ security ΡΠΏΡΠ»ΡΠ½ΠΎΡΡ (Π²ΠΈΡΡΡΠΏΠΈ Π½Π° ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΡΡΡ , Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΡ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ², ΠΏΡΠ±Π»ΡΠΊΠ°ΡΡΡ Π² Π±Π»ΠΎΠ³Π°Ρ ).
- ΠΠΎΡΠ²ΡΠ΄ Π· public cloud providers (AWS, Azure, GCP)
- ΠΠ²Ρ Π°Π±ΠΎ Π±ΡΠ»ΡΡΠ΅ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ Π· Π½Π°Π²Π΅Π΄Π΅Π½ΠΈΡ β OSEP, CRTO, CAPE, CCRTS, GRTP
- ΠΠ½Π³Π»ΡΠΉΡΡΠΊΠ° ΠΌΠΎΠ²Π° (Π1+)
ΠΠ»Ρ Π½Π°Ρ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ, ΡΠΎΠ± ΡΠΈ ΠΌΠ°Π²/-Π»Π°:- ΠΠ΄Π°ΡΠ½ΡΡΡΡ Π½Π΅ ΡΠ΅ΠΊΠ°ΡΠΈ Π½Π° Π·Π°Π²Π΄Π°Π½Π½Ρ, Π° ΡΠ°ΠΌΠΎΡΡΡΠΉΠ½ΠΎ Π·Π½Π°Ρ ΠΎΠ΄ΠΈΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π΄Π»Ρ ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ, Π΄ΡΡΡΠΈ Π½Π° Π²ΠΈΠΏΠ΅ΡΠ΅Π΄ΠΆΠ΅Π½Π½Ρ, Π±Π΅ΡΡΡΠΈ ΡΠ½ΡΡΡΠ°ΡΠΈΠ²Ρ Ρ ΡΠ²ΠΎΡ ΡΡΠΊΠΈ.
- Π£ΡΠ²ΡΠ΄ΠΎΠΌΠ»Π΅Π½Π½Ρ ΠΎΡΠΎΠ±ΠΈΡΡΠΎΠ³ΠΎ Π²Π½Π΅ΡΠΊΡ Π² Π·Π°Π³Π°Π»ΡΠ½ΠΈΠΉ ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ, Π½Π°Π΄ΡΠΉΠ½ΡΡΡΡ Ρ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ Π·ΠΎΠ±ΠΎΠ²βΡΠ·Π°Π½Ρ ΠΏΠ΅ΡΠ΅Π΄ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ ΡΠ° Π·Π°ΠΌΠΎΠ²Π½ΠΈΠΊΠ°ΠΌΠΈ.
- ΠΠΌΡΠ½Π½Ρ Π±ΡΠ΄ΡΠ²Π°ΡΠΈ Π΄ΠΎΠ²ΡΡΠ»ΠΈΠ²Ρ ΡΠ° Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½Ρ ΡΠΎΠ±ΠΎΡΡ ΡΡΠΎΡΡΠ½ΠΊΠΈ, Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ Π΄ΡΠ»ΠΈΡΠΈΡΡ Π·Π½Π°Π½Π½ΡΠΌΠΈ ΡΠ° ΡΠΏΡΠ»ΡΠ½ΠΎ Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΡΡΠ»Π΅ΠΉ.
- ΠΠ°ΠΆΠ°Π½Π½Ρ Π³Π»ΠΈΠ±ΠΎΠΊΠΎ ΡΠΎΠ·ΡΠΌΡΡΠΈ ΠΏΠΎΡΡΠ΅Π±ΠΈ ΠΊΠ»ΡΡΠ½ΡΠ°, ΡΠΎΠ± ΠΏΡΠΎΠΏΠΎΠ½ΡΠ²Π°ΡΠΈ ΡΡΡΠ΅Π½Π½Ρ, ΡΠΊΡ ΠΏΡΠΈΠ½ΠΎΡΡΡΡ ΡΠ΅Π°Π»ΡΠ½Ρ ΡΡΠ½Π½ΡΡΡΡ Π΄Π»Ρ ΠΉΠΎΠ³ΠΎ Π±ΡΠ·Π½Π΅ΡΡ.
- ΠΡΠ°Π³Π½Π΅Π½Π½Ρ Π±ΡΡΠΈ Π½Π°ΠΉΠΊΡΠ°ΡΠΈΠΌ Ρ ΡΠ²ΠΎΡΠΉ ΡΠΏΡΠ°Π²Ρ, ΡΠΎ ΠΏΡΠ΄ΠΊΡΡΠΏΠ»ΡΡΡΡΡΡ ΠΏΠΎΡΡΡΠΉΠ½ΠΈΠΌ ΠΏΠΎΠ³Π»ΠΈΠ±Π»Π΅Π½Π½ΡΠΌ ΡΠ° ΡΠΎΠ·ΡΠΈΡΠ΅Π½Π½ΡΠΌ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΈ, Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½ΡΠΌ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉ.
- ΠΠ½ΡΡΠΊΡΡΡΡ Ρ ΠΏΡΠ΄Ρ ΠΎΠ΄Π°Ρ , Π·Π΄Π°ΡΠ½ΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ ΡΠ΅Π°Π³ΡΠ²Π°ΡΠΈ Π½Π° Π·ΠΌΡΠ½ΠΈ ΡΠ° Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΠΎΠΌΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΡ.
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:- ΠΠΎΠΌΡΠΎΡΡΠ½Ρ ΠΎΡΡΡΠΈ Π½Π° ΠΊΠΈΡΠ²ΡΡΠΊΠΎΠΌΡ ΠΠΎΠ΄ΠΎΠ»Ρ Π· Π½Π°Π΄ΡΠΉΠ½ΠΈΠΌΠΈ ΡΠΊΡΠΈΡΡΡΠΌΠΈ ΡΠ° Π½Π°ΡΠ²Π½ΡΡΡΡ Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΡ, Π²ΠΎΠ΄ΠΎΠΏΠΎΡΡΠ°ΡΠ°Π½Π½Ρ ΡΠ° Π΅Π»Π΅ΠΊΡΡΠΎΠΆΠΈΠ²Π»Π΅Π½Π½Ρ Π² ΠΎΡΡΡΡ. Π’ΠΈ ΠΌΠΎΠΆΠ΅Ρ Π½Π΅ ΡΡΡΠ±ΡΠ²Π°ΡΠΈΡΡ ΠΏΡΠΎ ΡΡΡΠΈΠ½Ρ: ΡΡΡ Π½Π° ΡΠ΅Π±Π΅ ΡΠ΅ΠΊΠ°ΡΡΡ ΡΠ½ΡΠ΄Π°Π½ΠΊΠΈ, ΠΎΠ±ΡΠ΄ΠΈ, Π±Π΅Π·Π»ΡΡ ΡΠ½Π΅ΠΊΡΠ² ΡΠ° ΡΡΡΠΊΡΡΠ², Π»Π°ΡΠ½ΠΆΠ·ΠΎΠ½ΠΈ, ΠΌΠ°ΡΠ°ΠΆ ΡΠ° ΡΠ½ΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΈ ΠΎΡΡΡΠ½ΠΎΠ³ΠΎ ΠΆΠΈΡΡΡ;
- ΠΠ½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ ΡΠΎΠ±ΠΎΡΠΈ;
- ΠΠ½Π»Π°ΠΉΠ½-ΠΏΠΎΡΠ»ΡΠ³ΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΠ³ΠΎ Π»ΡΠΊΠ°ΡΡ, Π° ΠΏΡΡΠ»Ρ Π²ΠΈΠΏΡΠΎΠ±Π½ΠΎΠ³ΠΎ ΡΠ΅ΡΠΌΡΠ½Ρ β ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ Π² Π£ΠΊΡΠ°ΡΠ½Ρ;
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½ΠΎΡ Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ Π½Π° ΡΡΠΊ, Π½Π΅ΠΎΠ±ΠΌΠ΅ΠΆΠ΅Π½Π° ΠΊΡΠ»ΡΠΊΡΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ ;
- Π£ΡΡ Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½Ρ Π΄Π»Ρ ΡΠΎΠ±ΠΎΡΠΈ ΡΠ΅Ρ Π½ΡΠΊΡ;
- ΠΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ Π½Π° ΡΠΈΠ½ΠΊΡ ΠΊΡΡΡΡΠ², ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ ΠΎΠ½Π»Π°ΠΉΠ½-ΠΌΡΡΠ°ΠΏΠΈ ΡΠ° Π»Π΅ΠΊΡΡΡ, Π²Π΅Π»ΠΈΠΊΡ Π±ΡΠ±Π»ΡΠΎΡΠ΅ΠΊΡ, Π±ΡΠ·Π½Π΅Ρ- ΡΠ° ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ ΡΠΊΠΎΠ»ΠΈ Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²;
- ΠΠ΅Π·ΠΏΠ»Π°ΡΠ½Ρ ΡΡΠ΅Π½ΡΠ²Π°Π½Π½Ρ Π· Π±ΡΠ³Ρ, Π²ΠΎΠ»Π΅ΠΉΠ±ΠΎΠ»Ρ, Π±Π°ΡΠΊΠ΅ΡΠ±ΠΎΠ»Ρ, Π±ΠΎΠΊΡΡ, ΡΡΡΠ΅ΡΡΠΈΠ½Π³Ρ ΡΠ° ΠΉΠΎΠ³ΠΈ. ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ Π½Π° Π°Π±ΠΎΠ½Π΅ΠΌΠ΅Π½ΡΠΈ Π² ΡΠΏΠΎΡΡΠ·Π°Π»ΠΈ.
ΠΡΠ΄ΡΡΠΈΠΌΡΡΠΌΠΎ Π£ΠΊΡΠ°ΡΠ½Ρ.πΊπ¦Genesis Π·Π°ΡΡΠ΄ΠΆΡΡ Π²ΡΠΉΠ½Ρ ΡΠΎΡΡΡ ΠΏΡΠΎΡΠΈ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΠΉ Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°Ρ Π΄Π΅ΡΠΆΠ°Π²Ρ Π½Π° Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΠΌΡ, ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΠΌΡ ΡΠ° ΠΊΡΠ±Π΅ΡΡΡΠΎΠ½ΡΠ°Ρ . ΠΠ° ΠΏΠΎΡΠ°ΡΠΊΡ ΠΏΠΎΠ²Π½ΠΎΠΌΠ°ΡΡΡΠ°Π±Π½ΠΎΡ Π²ΡΠΉΠ½ΠΈ ΠΌΠΈ Π·Π°ΡΠ½ΡΠ²Π°Π»ΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΉ Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ½Π΄ Genesis for Ukraine. ΠΠΎΠΌΠ°Π½Π΄Π° ΡΠΎΠ½Π΄Ρ Π·Π°ΠΊΡΠΏΠΎΠ²ΡΡ Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½Π΅ ΡΠΏΠΎΡΡΠ΄ΠΆΠ΅Π½Π½Ρ, ΡΠ΅Ρ Π½ΡΠΊΡ ΠΉ ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½ΡΠΈ Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² ΡΠ° ΡΡ Π½ΡΡ ΡΠΎΠ΄ΠΈΡΡΠ², ΡΠΎ Π·Π°Ρ ΠΈΡΠ°ΡΡΡ ΠΊΡΠ°ΡΠ½Ρ Π½Π° ΠΏΠ΅ΡΠ΅Π΄ΠΎΠ²ΡΠΉ. ΠΡΡΠΌ ΡΠΎΠ³ΠΎ, ΠΌΠΈ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ Π΄ΠΎΠ½Π°ΡΠΈΠΌΠΎ Π½Π° ΠΠ‘Π£, Π° Π΄Π΅ΠΊΡΠ»ΡΠΊΠ° Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², ΡΡΠ²ΠΎΡΠ΅Π½ΠΈΡ Π² Π΅ΠΊΠΎΡΠΈΡΡΠ΅ΠΌΡ Genesis, Π·ΡΠΎΠ±ΠΈΠ»ΠΈ Π±Π΅Π·ΠΏΠ»Π°ΡΠ½ΠΈΠΌΠΈ Π΄Π»Ρ ΡΠΊΡΠ°ΡΠ½ΡΡΠ². ΠΠ΅ΡΠ°Π»ΡΠ½ΡΡΠ΅ ΠΏΡΠΎ Π½Π°Ρ ΡΡΠΏΡΠΎΡΠΈΠ² β ΡΡΡ Ρ ΡΡΡ.
More
ΠΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ! -
Β· 17 views Β· 5 applications Β· 4d
DevSecOps Engineer
Ukraine Β· Product Β· 3 years of experience Β· English - NoneΠ‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ! MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ...Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ!
MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ DevSecOps ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ°, ΡΠΊΠΈΠΉ Π±ΡΠ΄Π΅ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΈΠΉ Π·Π° ΡΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΡΠΎΡΠ΅ΡΠΈ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΠ’-ΡΡΡΠ΅Π½Ρ. ΠΠΎΠ³ΠΎ Π·Π°Π²Π΄Π°Π½Π½Ρ Π²ΠΊΠ»ΡΡΠ°ΡΠΈΠΌΡΡΡ ΠΎΡΡΠ½ΠΊΡ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΏΡΠ΄ ΡΠ°Ρ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΎΡΠΊΡΡΠ², ΡΠΎΠ·ΡΠΎΠ±ΠΊΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ, ΠΏΡΠΎΡΠΊΡΡΠ²Π°Π½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΠΠ΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠ°ΠΌΠΈ ΡΠ° ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡΡ, Π° ΡΠ°ΠΊΠΎΠΆ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°ΡΠ΄ΠΈΡΡΠ² Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΠΆΠΈΡΡΡΠ²ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΡ.Π€ΡΠ½ΠΊΡΡΡ ΠΏΠΎΡΠ°Π΄ΠΈ:
- ΠΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² CI/CD β Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΎΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ.
- ΠΠ½Π°Π»ΡΠ· Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ β Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ½Π΅ ΡΠΊΠ°Π½ΡΠ²Π°Π½Π½Ρ ΠΊΠΎΠ΄Ρ, ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΡΠ², Π·Π°Π»Π΅ΠΆΠ½ΠΎΡΡΠ΅ΠΉ, ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ.
- ΠΠ΅ΡΡΠ²Π°Π½Π½Ρ ΡΠ΅ΠΊΡΠ΅ΡΠ°ΠΌΠΈ β Π±Π΅Π·ΠΏΠ΅ΡΠ½Π΅ Π·Π±Π΅ΡΡΠ³Π°Π½Π½Ρ ΠΊΠ»ΡΡΡΠ², ΡΠΎΠΊΠ΅Π½ΡΠ², ΠΏΠ°ΡΠΎΠ»ΡΠ².
- ΠΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ β ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² least privilege ΡΠ° Zero Trust.
- ΠΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ β Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ² Ρ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ°Ρ Dev/Test/Prod.
- ΠΠΎΠ»ΡΡΠΈΠΊΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ β ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΉ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·Π°ΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π΄Π»Ρ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° ΠΊΠΎΠ΄Ρ.
- ΠΠ°Π²ΡΠ°Π½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ β ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊΡΠ² ΡΠΎΠ΄ΠΎ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄ΡΠ²Π°Π½Π½Ρ.
ΠΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΡΡΡΡ ΡΡΠ°Π½Π΄Π°ΡΡΠ°ΠΌ β Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ NIST, ISO 27001, NIS2 ΡΠΎΡΠΎ.
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ½ΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ DevSecOps, ΡΡ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π² pipeline ΡΠΊ Security Gate.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·Π³ΠΎΡΡΠ°Π½Π½Ρ ΡΠ° Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ (SAST, DAST, SCA, ASOC, Container/Kubernetes Security).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ, ΠΏΡΠΎΠ΅ΠΊΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ΅Π½Π°ΡΡΡΠ² Π°ΡΠ°ΠΊ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ ΡΠ°ΠΊΡΠΈΠΊ ΡΠ° ΡΠ΅Ρ Π½ΡΠΊ MITRE ATT&CK.
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ ΡΠ°ΠΊΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ ΡΠΊ OWASP Security Standards, CIS Controls, NIST Cybersecurity Framework, SANS.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΠΉ Shift-Left, ZeroTrust, SSDLC;
- ΠΠ½Π°Π½Π½Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π· OWASP Top-10 (web/mobile/api), ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π²ΠΎΠ½ΠΈ Π²ΠΈΠ½ΠΈΠΊΠ°ΡΡΡ ΡΠ° ΡΠΊ ΠΌΠΈΡΡΠ³ΡΡΡΡΡΡ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΡΠ°ΠΆΡ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π² ΡΠ°ΠΊΠΈΡ ΠΌΠΎΠ²Π°Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΡΠ²Π°Π½Π½Ρ (Ρ ΠΎΡΠ° Π± ΠΌΡΠ½ΡΠΌΠ°Π»ΡΠ½ΠΈΠΉ): Python, Java, JS, PHP, .NET.
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ² Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Azure AWS, K8s.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΠ°Ρ Azure (Azure Security Center, Azure Defender, Azure Policy), AWS (GuardDuty, CloudTrail), GCP.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· key vault, hashicorp vault, BYOK.
- ΠΠ½Π°Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΡΡΡΠΊΡΡΡ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ/Π°Π²ΡΠΎΡΠΈΠ·Π°ΡΡΡ (OAuth 2.0, OIDC, JWT).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΠΎΠ΄Π½ΠΈΠΌ Π°Π±ΠΎ Π΄Π΅ΠΊΡΠ»ΡΠΊΠΎΠΌΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ CI/CD (Azure DevOps, Gitlab, Ansible, Terraform).
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ ΡΠ· ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ ΠΊΠΎΠ»Π΅ΠΊΡΠΈΠ²Π½ΠΎΡ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ, Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ² ΡΠ° ΡΠ΅ΠΏΠΎΠ·ΠΈΡΠΎΡΡΡΠ² (AzDO, Git, Confluence, Jira).
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City, Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ)
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More
- 1
- 2