Jobs Information Security
21-
Β· 191 views Β· 30 applications Β· 5d
Operations Manager (Payments)
Full Remote Β· Countries of Europe or Ukraine Β· 3 years of experience Β· English - B2Weβre seeking a highly experienced Payments Operations Manager with deep expertise across high-risk merchant processing, international banking workflows, and secure operational environments. This role requires a sharp, detail-driven operator who can...Weβre seeking a highly experienced Payments Operations Manager with deep expertise across high-risk merchant processing, international banking workflows, and secure operational environments.
This role requires a sharp, detail-driven operator who can manage sensitive financial documentation, ensure airtight compliance, and coordinate seamlessly with global payments partners.You will oversee mission-critical processes tied to MID acquisition, high-risk merchant onboarding, banking compliance, and the maintenance of multi-jurisdiction corporate structures. Precision, discretion, and exceptional operational discipline are essential.
What Youβll Do
- Monitor payment flows and detect anomalies
- Coordinate support, finance, and engineering teams
- Handle operational escalations and incidents
- Improve and document internal procedures
- Ensure smooth day-to-day operations across the payment stack
Youβll Be a Great Fit If
- Experience in fintech or payment operations
- Strong understanding of payment flows
- Excellent communication and coordination skills
- Problem-solver mindset
- Ability to work in fast-paced environments
Would Be a Plus
- Experience with high-risk payment processors (Rocketgate, Sticky.io, Konnektive, NMI, Authorize.net, Paynetics, etc.)
- Understanding of gateway routing, risk scoring, fraud controls, and merchant monitoring
- Ability to communicate with global banking partners (multilingual a bonus)
- Comfortable working within or close to the Dubai time zone
- Background in fast-paced, high-compliance environments
- Startup mindset β able to bring structure into evolving processes
What Youβll Have With Us
- Fully remote work
- High level of ownership
- Clear operational structure
- Supportive team with strong communication culture
More -
Β· 28 views Β· 2 applications Β· 25d
Information Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· English - B2Delasport β Implementing Technological Solutions Here and Now. Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for...Delasport β Implementing Technological Solutions Here and Now.
Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for Sports Betting and Online Casino from a White-Label, with a full range of management services to a Plug&Play iFrame and a complete Turnkey. We are establishing an R&D center in Kyiv, and are looking for top talents to join our team.
This position requires full-time office work. Kyiv, 58 Yaroslavska str.
RESPONSIBILITIES
- Monitor compliance with information security and privacy policies at a technology company.
- Completing vendor security assessments and reviews.
- Reviewing security clauses in customer and vendor contracts.
- Providing, reviewing, and enhancing security training and awareness programs.
- Management of the organizationβs technological risk assessments.
- Helping security leaders to identify and assess risks of the organization and developing strategies to manage and mitigate these risks.
- Develop and implement best practices for assessing and evaluating IT and security controls for the organizationβs third-party businesses.
- Manage the penetration testing and technical risk assessments from end to end.
- Supporting the business with customer engagements, including attending customer calls and supporting our sales teams
REQUIREMENTS
- Minimum of 5 years of experience in a similar role in a technology/software/cloud organization
- Experience implementing and enforcing information security, regulatory, and privacy policies across the business.
- Acquaintance working with cyber security tools and products.
- Solid knowledge of information security principles and practices.
- Knowledge of risk management frameworks and industry compliance standards such as ISO 27001/ SOC2/ PCI DSS
- Excellent interpersonal skills and ability to work in a team with multiple interfaces.
- Experience working at SaaS provider company β an advantage.
- Fluent English
WHAT WE CAN OFFER YOU
- Modern office in Podil with an uninterruptible power supply and the Internet
- Personal time off (21 business days of paid vacation, paid days on special occasions, sick leaves, emergency days off)
- Public holidays
- Health and life insurance with our broker, available starting from the month following the employeeβs start date with the company
- Modern technical equipment
- English courses with native speakers
- Ukraine-based educational programs
- Sports activities reimbursement
- Corporate entertainments
- Happy hours on Fridays
- Gig contract support
-
Β· 70 views Β· 8 applications Β· 24d
Information Security Manager
Full Remote Β· EU Β· Product Β· 4 years of experience Β· English - B2We are looking for an Information Security Manager who will help mature our security culture, formalize internal processes, and lead the company toward continuous improvement of its security posture. You will collaborate with teams across the...We are looking for an Information Security Manager who will help mature our security culture, formalize internal processes, and lead the company toward continuous improvement of its security posture. You will collaborate with teams across the organization, develop security documentation, run awareness initiatives, and ensure a practical balance between strong security and fast-moving business operations in a fully remote and autonomous environment.
Requirements- 4+ years of experience in Information Security, preferably in Security Manager, ISO, GRC, or Compliance roles;
- Experience participating in an ISO 27001 certification process from start to finish;
- Strong knowledge of ISO 27001:2022, ISMS structure, risk management, and audit methodology;
- Excellent written and spoken English (Upper-Intermediate+);
- Experience preparing and maintaining security documentation;
- Strong communication and presentation skills;
- Ability to work independently and manage processes;
- Understanding of IT and cloud environments at a security governance level.
Nice to Have
- Experience delivering security awareness programs;
- Experience conducting internal audits;
- Familiarity with AWS, MS365, or cloud environments from a governance perspective;
- Knowledge of SOC2, NIST CSF, or GDPR frameworks;
General understanding of technical security areas (e.g., endpoint security, logging, identity security, cloud security principles), allowing future involvement in cross-functional security initiatives.
Personal Skills
- Strong analytical and communication skills;
- Ability to influence and engage employees in security improvements;
- High autonomy, ownership, and structured thinking;
- Ability to manage multiple processes simultaneously.
Benefits
Why Join Us?
π° Be part of the international iGaming industry β Work with a top European solution provider and shape the future of online gaming;
π A Collaborative Culture β Join a supportive and understanding team;
π° Competitive salary and bonus system β Enjoy additional rewards on top of your base salary;
π Unlimited vacation & sick leave β Because we prioritize your well-being;
π Professional Development β Access a dedicated budget for self-development and learning;
π₯ Healthcare coverage β Available for employees in Ukraine and compensation across the EU;
π« Mental health support β Free consultations with a corporate psychologist;
π¬π§ Language learning support β We cover the cost of foreign language courses;
π Celebrating Your Milestones β Special gifts for lifeβs important moments;
β³ Flexible working hours β Start your day anytime between 9:00-11:00 AM;
π’ Flexible Work Arrangements β Choose between remote, office, or hybrid work;
π₯ Modern Tech Setup β Get the tools you need to perform at your best;
π Relocation support β Assistance provided if you move to one of our hubs.
More -
Β· 108 views Β· 8 applications Β· 8d
OSINT Specialist
Office Work Β· Ukraine (Lviv) Β· Product Β· English - A2Our client is a Ukrainian company specializing in the development and production of products for security and defense needs. Their work combines engineering solutions, research, manufacturing, and analytics in an environment that demands reliability,...Our client is a Ukrainian company specializing in the development and production of products for security and defense needs. Their work combines engineering solutions, research, manufacturing, and analytics in an environment that demands reliability, confidentiality, and technological excellence.
Due to business expansion, we are looking for an OSINT Specialist to join the team. This role involves conducting comprehensive research based on open-source information. It requires working with sensitive data, a high level of responsibility, and strict adherence to internal security policies.
We welcome applications from experienced professionals as well as candidates who are just starting their careers and completed relevant courses, who are also eager to learn and grow with the team.
Key Responsibilities:
- Conduct in-depth OSINT research on companies, owners, beneficiaries, markets, technological niches, competitive environments, and political, geopolitical, and security-related events.
- Perform background checks on candidates during hiring and internal transfers.
- Verify potential contractors and partners before establishing business relationships.
- Monitor personnel reliability through analysis of open sources, media, registries, and social networks; identify collaboration risks, legal violations, and other factors that may cause financial or reputational harm.
- Ensure compliance with internal policies and procedures related to personnel and information security.
Requirements:
- Experience in OSINT or a basic understanding of the field.
- OSINT or cybersecurity certification is an advantage.
- Hands-on experience with tools and platforms for collecting and analyzing open-source information.
- Proficiency in working with databases and search engines.
- Strong communication skills and ability to work in a team.
- High level of responsibility, attention to detail, and organizational skills.
What the Company Offers:
- Official employment and competitive compensation.
- Possibility of military service deferment (reservation).
- 24 calendar days of paid vacation, sick leave, and full social benefits.
- A strong corporate culture and values that foster a comfortable and engaging work environment.
If you have relevant experience or a strong desire to develop in this field, please send us your resume. We will be happy to consider your application!
More -
Β· 6 views Β· 0 applications Β· 4d
Information Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· English - B2Delasport β Implementing Technological Solutions Here and Now. Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for...Delasport β Implementing Technological Solutions Here and Now.
Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for Sports Betting and Online Casino from a White-Label, with a full range of management services to a Plug&Play iFrame and a complete Turnkey. We are establishing an R&D center in Kyiv, and are looking for top talents to join our team.
This position requires full-time office work. Kyiv, 58 Yaroslavska str.
RESPONSIBILITIES
- Monitor compliance with information security and privacy policies at a technology company.
- Completing vendor security assessments and reviews.
- Reviewing security clauses in customer and vendor contracts.
- Providing, reviewing, and enhancing security training and awareness programs.
- Management of the organizationβs technological risk assessments.
- Helping security leaders to identify and assess risks of the organization and developing strategies to manage and mitigate these risks.
- Develop and implement best practices for assessing and evaluating IT and security controls for the organizationβs third-party businesses.
- Manage the penetration testing and technical risk assessments from end to end.
- Supporting the business with customer engagements, including attending customer calls and supporting our sales teams
REQUIREMENTS
- Minimum of 5 years of experience in a similar role in a technology/software/cloud organization
- Experience implementing and enforcing information security, regulatory, and privacy policies across the business.
- Acquaintance working with cyber security tools and products.
- Solid knowledge of information security principles and practices.
- Knowledge of risk management frameworks and industry compliance standards such as ISO 27001/ SOC2/ PCI DSS
- Excellent interpersonal skills and ability to work in a team with multiple interfaces.
- Experience working at SaaS provider company β an advantage.
- Fluent English
WHAT WE CAN OFFER YOU
- Modern office in Podil with an uninterruptible power supply and the Internet
- Personal time off (21 business days of paid vacation, paid days on special occasions, sick leaves, emergency days off)
- Public holidays
- Health and life insurance with our broker, available starting from the month following the employeeβs start date with the company
- Modern technical equipment
- English courses with native speakers
- Ukraine-based educational programs
- Sports activities reimbursement
- Corporate entertainments
- Happy hours on Fridays
- Gig contract support
-
Β· 41 views Β· 9 applications Β· 3d
IT Security Engineer
Full Remote Β· EU Β· Product Β· 3 years of experience Β· English - B2RISK inc: An International iGaming Company Pushing the Boundaries of Entertainment Who We Are: An international iGaming company specializing in identifying and fostering the growth of high-potential entertainment markets. With 1000+ professionals in 20+...RISK inc: An International iGaming Company Pushing the Boundaries of Entertainment
Who We Are:
An international iGaming company specializing in identifying and fostering the growth of high-potential entertainment markets. With 1000+ professionals in 20+ locations, we operate in 10 countries, serving over 300,000 customers.
Always Pushing the Boundaries? You Already Belong at RISK!
Our global-scale operations are based on strong internal expertise, analytics, and data research. We have expertise in iGaming operations (sports betting, online casino), digital and affiliate marketing, tech solutions, and data analytics.
In this role you will:
- Follow standard operating procedures to respond to real-time suspicious events from Antivirus, Endpoints, and Infrastructure systems.
- Evaluate and define security requirements and necessary settings for new systems and services before deployment.
- Actively participate in team projects focused on vulnerability management, system hardening, and security control deployment.
- Collaborate with various IT and operational teams to coordinate multi-team security projects and incident resolution efforts.
- Continuously apply and develop knowledge on network and systems security, security testing, and threat analysis.
Skills you will need to bring:
- Hands-on experience with EDR/AV (preferably Bitdefender): deployment, configuration, monitoring, incident handling.
- Firewall management (Fortigate): policy review, optimization, IPS/IDS, VPN, network hardening.
- DLP administration and basic WAF/perimeter protection knowledge.
- Vulnerability scanning and analysis (on-prem/cloud) + basic Web App Pentesting (OWASP Top 10).
- Experience with MDM tools (Jamf, Intune, SCCM, Google Workspace) and device security policies.
- Strong understanding of security fundamentals, Windows/Linux, and core protocols (TCP/IP, DNS, HTTP, TLS).
- Familiarity with scripting (Bash, Python, PowerShell).
- Strong communication skills, ownership, teamwork, and willingness to learn.
- English: Upper-Intermediate.
Additional Information
Our Benefit Cafeteria is Packed with Goodies:
- Children Allowance
- Mental Health Support
- Sport Activities
- Language Courses
- Automotive Services
- Veterinary Services
- Home Office Setup Assistance
- Dental Services
- Books and Stationery
- Training Compensation
- And yes, even Massage!
More -
Β· 46 views Β· 3 applications Β· 3d
Information Security Analyst
Full Remote Β· Ukraine Β· Product Β· 2 years of experience Β· English - B2Position Name: Information Security Analyst Reports to: Chief Information Security Officer Location/Type: Remote (UA Candidates only) Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge...Position Name: Information Security Analyst
Reports to: Chief Information Security Officer
Location/Type: Remote (UA Candidates only)Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge funds and other investment firms. Founded in 2016, we have grown year over year through our uncompromising focus on service.
We value ownership, execution, growth, intelligence, and camaraderie. We are looking for people who share our Core Values, thrive, and contribute to this environment while putting the customer first. At Atlas Technica, we offer a competitive salary, comprehensive benefits, and great perks to our global Team. We strive to maintain a professional yet friendly environment while promoting professional and career development for our Team Members. Join Atlas Technica now!
We seek a skilled Information Security Analyst to join our rapidly growing organization. This is a highly technical role providing excellent career development opportunities for the successful candidate. You will be work closely with the Chief Information Security Officer (CISO) and various teams to maintain and improve the security posture of Atlas and its clients. As a new position, this role will evolve, providing opportunities for growth and adaptation.
Responsibilities:
Vulnerability Management:
- Review vulnerability reports.
- Research scalable solutions for vulnerability remediation.
- Collaborate with Support/NOC to ensure remediations have minimal impact on clients and facilitate maintenance windows.
- Work with CS/Engineering to script and automate remediations.
- Track progress in ticketing system, including master tickets for multi-client initiatives and sub tickets for individual clients.
- Address vulnerabilities for clients' third-party vulnerability management, including overlap with Cavelo, and apply remedies to other clients.
Risk Management and Due Diligence:
- Provide accurate and timely responses to Due Diligence Questionnaires (DDQs).
- Review and analyze findings from risk assessments and penetration tests for Atlas and clients.
- Address identified vulnerabilities and recommend remediation strategies.
- Participate in Business Impact Analyses and tabletop exercises to enhance organizational resilience.
Industry Benchmark Alignment and Standards Updating:
- Start measuring alignment with Microsoft benchmarks in Intune and work on increasing the score.
- Address vulnerabilities and issues identified in workstation builds, cloud infrastructure configurations, and security configurations.
- Harden systems to enhance security across workstations, cloud infrastructure, and security configurations.
SOC 2 Maintenance and Additional Security Tasks:
- Perform test restores.
- Conduct reviews of our KnowBe4 phishing tests and training.
- Review SIEM logs.
- Assist in addressing cybersecurity incidents.
- Work with NOC and outsourced SOC on remediation runbooks.
Perform additional tasks as assigned to support the security team and organization.
Requirements:
β’ Strong understanding of cybersecurity principles and practices.
β’ Experience with vulnerability management and remediation.
β’ Familiarity with Microsoft Intune and security benchmarks.
β’ Excellent analytical and problem-solving skills.
β’ Ability to work collaboratively with cross-functional teams.
β’ Strong communication skills, both written and verbal.
β’ Strong ability to work independently.
β’ Experience with security tools (SIEM, IDS/IPS, vulnerability scanners).
β’ Experience with RMM/SOAR and other automation platforms.
β’ Experience scripting.
β’ Experience writing runbooks.Desirable Qualities:
β’ Experience working in an MSP environment (preferred, but not required).
More
β’ Relevant certifications (AZ-500, SC-900, SC-300, CompTIA Security+, etc.) -
Β· 15 views Β· 2 applications Β· 8h
Information security engineer
Ukraine Β· Product Β· 3 years of experience Β· English - B2Who weβ― are:β― RBI Retail Innovation is a product development company, a part of the group of Raiffeisen Bank International (Vienna, Austria). We are a stable company that works in the EU market. Now we have products in Poland. Our ambition will be...Who weβ― are:β―
RBI Retail Innovation is a product development company, a part of the group of Raiffeisen Bank International (Vienna, Austria). We are a stable company that works in the EU market. Now we have products in Poland. Our ambition will be widespread in EU countries in the next few years. Our projects include next-gen digital banking platformsβ design, delivery, and post-delivery activities. Our team is international but mainly consists of Ukrainian developers. We have offices in Kyiv and Rivne. Our mission is to provide seamless banking with ease and speed thatβs built for people. Our values are People First, Product Passion, and Trust.
About you:β―
- Atβ―least 3β―years ofβ―experience inβ―the information security field, including but not limitedβ―to: Web/Mobile Application Security, Cloud Security, Penetration Testing, Vulnerability Assessment, etc.
- Ability toβ―manually find and exploit basic web vulnerabilities
- Familiarity with OWASP Security Testing Guides, OWASP Top 10
- Knowledge and understanding ofβ―Application Security, Cloud Security (AWS), Authentication and Security protocols
- Strong communication troubleshooting skills
- Good English skills (Intermediate+)
- Self-disciplined
Will beβ―aβ―plus:
- Experience inβ―web/mobile development
- Relevance certifications such asβ―AWS Cloud Security, EC-Council CEH, Offensive Security: OSCP, OSWE, OSCE
- Security related publications, blog posts, and/or participation inβ―tools development
- BugBunty experience (please provide link toβ―your profile)
- Experience with various penetration testing tools (e.g., BurpSuite, Metasploit, OWASP ZAP)
You will:
Drive company application security and product improvements:
- Performing security assessment and internal penetration testing
- Working closely with Developers and DevOps onβ―promoting, clarification, and implementing leading security mechanisms inβ―the products and infrastructure
- Provide guidance onβ―secure system architecture (including cloud security) and software development processes aiming toβ―achieve best inβ―class security for our products
- Estimate application security risks and suggest mitigation strategies, maintain Threat Modeling
- Assess current application security posture against OWASP ASVS and MASVS
Drive vulnerability management including:
- Provide recommendation and best practice onβ―vulnerability remediation
- Facilitate, communicate, and assess mitigation steps
- Help key stakeholders toβ―understand the vulnerabilities
Participateβ―as (SME) subject matter expert inβ―security incidents assessment, analysis, and remediation.
What weβ―offer:β―
- You will beβ―aβ―part ofβ―global team ofβ―RBI Groupβ―β one ofβ―the leading banking groups inβ―Central and Eastern Europeβ―
- Anβ―opportunity toβ―work with some ofβ―the most talented and experienced people inβ―the Fintech industryβ―
- The ability toβ―drive change and innovation inβ―the products weβ―developβ―
- Official employment, gig-contractβ―
- Remote-first work modelβ―
- Competitive salaryβ―
- Personal and professional growth, corporate English coursesβ―
- Paid sick days-off and 20 working days of vacation per yearβ―
- Medical insuranceβ―
-
Β· 65 views Β· 4 applications Β· 4d
GRC Specialist
Full Remote Β· Ukraine Β· 1 year of experience Β· English - B2ΠΡΠΈΠ²ΡΡ, ΠΌΠΈ β ESKA, ΠΊΠΎΠΌΠ°Π½Π΄Π° Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ² Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΊΡ ΠΏΠ»Π°Π½ΡΡΡΡ, ΠΏΡΠΎΠ΅ΠΊΡΡΡΡΡ Ρ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΡΡ Π½Π°ΠΉΠ½Π°Π΄ΡΠΉΠ½ΡΡΡ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² Π£ΠΊΡΠ°ΡΠ½Ρ. Π 2014 ΡΠΎΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠΈ ESKA ΡΡΠΎΡΡΡ Π½Π° Π²Π°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠ° ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π°ΡΠΈΡ ΠΊΠ»ΡΡΠ½ΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ ΡΠ°...ΠΡΠΈΠ²ΡΡ,
ΠΌΠΈ β ESKA, ΠΊΠΎΠΌΠ°Π½Π΄Π° Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ² Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΊΡ ΠΏΠ»Π°Π½ΡΡΡΡ, ΠΏΡΠΎΠ΅ΠΊΡΡΡΡΡ Ρ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΡΡ Π½Π°ΠΉΠ½Π°Π΄ΡΠΉΠ½ΡΡΡ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² Π£ΠΊΡΠ°ΡΠ½Ρ. Π 2014 ΡΠΎΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠΈ ESKA ΡΡΠΎΡΡΡ Π½Π° Π²Π°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠ° ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π°ΡΠΈΡ ΠΊΠ»ΡΡΠ½ΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ ΡΠ° ΡΠ²ΡΡΡ.
Π―ΠΊΡΠΎ ΡΠ²ΠΎΡ ΠΏΡΠΈΡΡΡΠ°ΡΡΡ β Π΄Π±Π°ΡΠΈ ΠΏΡΠΎ Π·Π°Ρ ΠΈΡΡ Π΄Π°Π½ΠΈΡ Ρ ΡΠΈ Ρ ΠΎΡΠ΅Ρ Π±ΡΡΠΈ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΡΠΏΡΠ°Π²ΠΆΠ½ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΠΌΡΠ»ΠΈΠ²ΠΎ Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ Π½Π°ΠΌ ΡΠ²ΠΎΡ ΡΠ΅Π·ΡΠΌΠ΅.
Π©ΠΎ Π½Π° ΡΠ΅Π±Π΅ ΡΠ΅ΠΊΠ°Ρ Ρ Π½Π°Ρ?
ΠΠΎΠΌΠ°Π½Π΄Π° β Π² Π½Π°Ρ ΡΠΈ ΡΡΠ°Π½Π΅Ρ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΡΠΏΡΠ°Π²ΠΆΠ½ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ: ΠΏΡΠΎΡΡΠΈΡ , Π΄ΡΡΠ΅Π²Π½ΠΈΡ , ΡΠ΅ΡΠ½ΠΈΡ , Π²ΡΠ΄ΠΊΡΠΈΡΠΈΡ ΡΠ° Π·Π°Π²Π·ΡΡΠΈΡ Π»ΡΠ΄Π΅ΠΉ, ΡΠΊΡ Π²ΡΠ΄Π΄Π°Π½Ρ ΡΠ²ΠΎΡΠΉ ΡΠΏΡΠ°Π²Ρ;
ΠΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ β ΠΌΠΈ ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠ»ΡΠ΄ΠΊΡΡΠΌΠΎ Π·Π° Π½ΠΎΠ²ΠΈΠ½ΠΊΠ°ΠΌΠΈ ΡΠ²ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΡΠ° ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π±Π΅ΡΠ΅ΠΌΠΎ Π² ΡΠΎΠ±ΠΎΡΡ Π½Π°ΠΉΠΊΡΠ°ΡΡ Π½ΠΎΠ²ΡΡΠ½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΈ, ΡΠΎ ΠΆ ΡΠΈ Π·Π°Π²ΠΆΠ΄ΠΈ Π±ΡΠ΄Π΅Ρ Π² Π³Π°ΡΠ½ΡΠΉ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΡΠΉ ΡΠΎΡΠΌΡ;
ΠΠ½ΡΡΠΊΡΡΡΡ β ΡΠ²ΡΡ Π·ΠΌΡΠ½ΡΡΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ, ΠΌΠΈ ΠΏΡΠ°Π³Π½Π΅ΠΌΠΎ ΡΡΡ Π°ΡΠΈΡΡ Π² ΡΠ°ΠΊΠΎΠΌΡ ΠΆ ΡΠΈΡΠΌΡ: Π»ΠΎΠΊΠ°ΡΡΡ, Π³ΡΠ°ΡΡΠΊΠΈ, ΠΏΡΠ΄Ρ ΠΎΠ΄ΠΈ, ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ. ΠΠΈ ΠΊΠΎΠΌΠ±ΡΠ½ΡΡΠΌΠΎ Π³Π½ΡΡΠΊΡΡΡΡ Π² ΠΏΡΠΎΡΠ΅ΡΠ°Ρ Π· ΠΆΠΎΡΡΡΠΊΡΡΡΡ Π²ΠΈΠΌΠΎΠ³ Π΄ΠΎ ΡΠΊΠΎΡΡΡ ΠΊΡΠ½ΡΠ΅Π²ΠΎΠ³ΠΎ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ.
Π‘ΡΠΎΠ³ΠΎΠ΄Π½Ρ, Π² Π·Π²βΡΠ·ΠΊΡ Π· ΡΠΎΠ·ΡΠΈΡΠ΅Π½Π½ΡΠΌ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΠΎΠΌ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π½Π° Π³Π»ΠΎΠ±Π°Π»ΡΠ½ΠΎΠΌΡ ΡΠΈΠ½ΠΊΡ, ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ GRC Specialist
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ?
- Π ΠΈΠ½ΠΊΠΎΠ²Ρ ΠΎΠΏΠ»Π°ΡΡ β ΡΡΠΊΡΠΎΠ²Π°Π½Π° ΡΠ°ΡΡΠΈΠ½Π°, ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½Ρ ΡΡΠ²Π½Ρ ΡΠ²ΠΎΠ³ΠΎ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΎΠ³ΠΎ Π΄ΠΎΡΠ²ΡΠ΄Ρ;
- ΠΡΡΡΠ½ΠΈΠΉ ΡΠΎΡΠΌΠ°Ρ ΡΠΎΠ±ΠΎΡΠΈ (Π³ΡΠ±ΡΠΈΠ΄ Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ) β Π· ΠΏΠΎΠ½Π΅Π΄ΡΠ»ΠΊΠ° ΠΏΠΎ ΠΏβΡΡΠ½ΠΈΡΡ Π· 09 Π΄ΠΎ 18.00;
- Π ΠΎΠ±ΠΎΡΠ° Π² ΡΡΠΊΠ°Π²ΠΈΡ ΠΏΡΠΎΠ΅ΠΊΡΠ°Ρ ;
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΠΎΡΠ»ΡΠ΄ΠΎΠ²Π½ΠΎ Π½Π°Π²ΡΠ°ΡΠΈΡΡ ΡΠ° ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ, ΠΏΡΠ΄Π²ΠΈΡΡΠ²Π°ΡΠΈ Π·Π½Π°Π½Π½Ρ ΡΠ° ΡΡΠ²Π΅Π½Ρ ΠΏΠΎΠ·ΠΈΡΡΡ;
- ΠΠΎΠ΄Π°ΡΠΊΠΎΠ²ΠΎ: Π²ΠΈΡ ΡΠ΄Π½Ρ ΡΠ° ΡΠ²ΡΡΠΊΠΎΠ²Ρ Π΄Π½Ρ, Π²ΡΠ΄ΠΏΡΡΡΠΊΠ° (24 Π΄Π½Ρ), ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ, ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΡΠ΅Ρ Π½ΡΠΊΠ°;
- ΠΠ°ΡΠΈΡΠ΅Π½Π΅ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π΅ ΠΆΠΈΡΡΡ;
Π©ΠΎ Π΄Π»Ρ Π½Π°Ρ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ?
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΡΠΉ Π±Π΅Π·ΠΏΠ΅ΡΡ Π²ΡΠ΄ 1 ΡΠΎΠΊΡ;
- ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Ρ Governance, Risk & Compliance (GRC) Π² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΡΠΉ Π±Π΅Π·ΠΏΠ΅ΡΡ: governance, risk management, compliance, third-party risk, incident/data security basics.
- ΠΠ½Π°Π½Π½Ρ ΡΠ° Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ²/ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΡΠ²: ISO/IEC 27001/27002, SOC 2, PCI DSS, NIST CSF, CIS Controls, DORA.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΡΠ· Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ ΡΠ° ΡΠ΅Π³ΡΠ»ΡΡΠΎΡΠΈΠΊΠΈ: GDPR, CCPA (ΡΠ° ΡΠ½ΡΠΈΡ ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½ΠΈΡ Π²ΠΈΠΌΠΎΠ³).
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ISMS (ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ, ΠΏΡΠΎΡΠ΅ΡΠΈ, ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ½Ρ Π·Π°Ρ ΠΎΠ΄ΠΈ, ΠΌΠ΅ΡΡΠΈΠΊΠΈ).
- ΠΠΎΡΠ²ΡΠ΄ Π²Π½ΡΡΡΡΡΠ½ΡΡ /Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ Π°ΡΠ΄ΠΈΡΡΠ² ΡΠ° ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠΈ Π΄ΠΎ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ/ΠΎΡΡΠ½ΠΎΠΊ ΠΊΠΎΠΌΠΏΠ»Π°ΡΠ½ΡΡ (ISO 27001, SOC 2, PCI DSS ΡΠΎΡΠΎ).
- ΠΠΌΡΠ½Π½Ρ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΈ ΡΠ° Π°ΠΊΡΡΠ°Π»ΡΠ·ΡΠ²Π°ΡΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ, ΠΏΡΠΎΡΠ΅Π΄ΡΡΠΈ, ΡΡΠ°Π½Π΄Π°ΡΡΠΈ, ΠΏΠ»Π°Π½ΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΡΠ²ΡΠ΄ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· ΠΊΠ»ΡΡΠ½ΡΠ°ΠΌΠΈ, ΠΏΡΠ΄ΡΡΠ΄Π½ΠΈΠΊΠ°ΠΌΠΈ ΡΠ° Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌΠΈ Π² ΡΠ°ΠΌΠΊΠ°Ρ GRC-ΠΏΡΠΎΡΠΊΡΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ/ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ security awareness.
- ΠΡΠΈΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ, ΡΠ²Π°ΠΆΠ½ΡΡΡΡ, problem-solving, ΠΎΡΠ³Π°Π½ΡΠ·ΠΎΠ²Π°Π½ΡΡΡΡ/ΡΠ°ΠΉΠΌ-ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ, ΡΠΈΠ»ΡΠ½Π° ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ.
ΠΡΠ΄Π΅ ΠΏΠ»ΡΡΠΎΠΌ: ΠΊΠΎΠ½ΡΠ°Π»ΡΠΈΠ½Π³; risk assessments ΡΠ° vendor/third-party risk; ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ ISO 27001 LI/LA, CISA/CRISC/CISSP/CISM; ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ GRC-ΡΠ½ΡΡΡΠ°ΡΠΈΠ²; English Upper-Intermediate+.
Π©ΠΎ Π±ΡΠ΄Π΅ Π²Ρ ΠΎΠ΄ΠΈΡΠΈ Π΄ΠΎ ΠΏΠ΅ΡΠ΅Π»ΡΠΊΡ ΡΠ²ΠΎΡΡ Π·Π°Π΄Π°Ρ?
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π²Π½ΡΡΡΡΠ½ΡΡΡ ΡΠ° Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ Π°ΡΠ΄ΠΈΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, SOC 2, PCI DSS, DORA, GDPR ΡΠ° ΡΠ½ΡΡ);
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ISMS Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ CIS Controls, NIST CSF, ISO 27002 ΡΠ° ΡΠ½ΡΠΈΡ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΡΠ²;
- ΠΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΡΠ° ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΡΠ² Π· ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΡΠΎΠ΄ΠΎ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π»Ρ ΠΊΠ»ΡΡΠ½ΡΡΠ²;
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ, ΠΏΡΠΎΡΠ΅Π΄ΡΡΠΈ, ΠΏΠ»Π°Π½ΠΈ, ΡΠΎΡΠΎ;
- ΠΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΡΠΎΠ»Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΠ° Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π»Ρ ΠΊΠ»ΡΡΠ½ΡΡΠ² Π· ΡΡΠ·Π½ΠΈΡ Π³Π°Π»ΡΠ·Π΅ΠΉ;
- ΠΠΎΠ½ΡΡΠ»ΡΡΠ°ΡΡΡ Π· ΠΏΠΈΡΠ°Π½Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ (GDPR, CCPA, ΡΠ° ΡΠ½ΡΡ);
- ΠΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ ΡΠΎΠ±ΠΎΡΠΈ Π· ΠΊΠ»ΡΡΠ½ΡΠ°ΠΌΠΈ ΡΠ° Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ²ΠΎΡΡΠ°ΡΠ½ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ²;
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ ΡΠ° Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡΠ² ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ GRC, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΏΡΠ΄ΡΡΠ΄Π½ΠΈΠΊΡΠ² Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ².
Π’ΠΎΠ±Ρ ΡΡΠΊΠ°Π²ΠΎ?
Π’ΠΈ Π±Π°ΡΠΈΡ ΡΠ΅Π±Π΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ?
Π’ΠΎ ΡΠΊΠΎΡΡΡΠ΅ Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ ΡΠ²ΠΎΡ ΡΠ΅Π·ΡΠΌΠ΅ ΡΠ° Π΄ΠΎ Π·ΡΡΡΡΡΡΡ :)
More -
Β· 32 views Β· 0 applications Β· 8d
Network Security Engineer
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· English - None Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠΈΠΌΠΎΠ³ΠΈ:
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°ΡΠΎΠ±ΡΠ² ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΠΏΠΎΠ΄ΡΠΉ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Ρ ΡΠΎΠ±ΠΎΡΠΈ Π· Splunk Security;
- ΠΠ½Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (NIST, ISO 27001, PCI DSS, PA DSS, CIS Controls v8, CSA Cloud Controls, SOC2, OWASP);
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ, SOC;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· IDS/IPS;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Π·Π°ΡΠΎΠ±ΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΡΠ½ΡΠ΅Π²ΠΈΡ ΡΠΎΡΠΎΠΊ (AV, EDR);
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΠΠ, ΡΠ°ΠΊΠΈΡ ΡΠΊ - IPSec, VPN. TLS, SSL, HTTPS, SSH, PKI;
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΠΈΠΏΡΠ² ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° Π·Π°ΡΠΎΠ±ΡΠ² ΡΡ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, Π»ΠΎΠΊΠ°Π»ΡΠ·Π°ΡΡΡ ΡΠ° ΠΏΡΠΎΡΠΈΠ΄ΡΡ.
ΠΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- Π Π΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- Π ΠΎΠ±ΠΎΡΠ° Π· ΡΡΠ·Π½ΠΈΠΌΠΈ Π΄ΠΆΠ΅ΡΠ΅Π»Π°ΠΌΠΈ ΠΏΠΎΠ΄ΡΠΉ, Π½Π°ΠΏΠΈΡΠ°Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΡΠΎΠ΄ΠΎ Π·Π±ΠΎΡΡ ΡΠ° Π½ΠΎΡΠΌΠ°Π»ΡΠ·Π°ΡΡΡ ΠΏΠΎΠ΄ΡΠΉ Ρ SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΠΊΠΎΡΠ΅Π»ΡΡΡΡ Π² SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ°ΡΡΠ΅ΡΡΠ² Π΄Π»Ρ Π½Π΅ΠΏΡΠ΄ΡΡΠΈΠΌΡΠ²Π°Π½ΠΈΡ Π΄ΠΆΠ΅ΡΠ΅Π» ΠΏΠΎΠ΄ΡΠΉ;
- Π ΠΎΠ·ΡΠΎΠ±Π»Π΅Π½Π½Ρ Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° Π² Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΌΡ ΡΡΠ°Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ², ΡΠΊΡ ΡΡΠΎΡΡΡΡΡΡΡ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- 12 sick days ΡΠ° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ;
- ΠΠΈΡ ΡΠ΄Π½ΠΈΠΉ Π² Π΄Π΅Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ;
- Π ΠΎΠ·Π²ΠΈΡΠΎΠΊ ΡΠ° Π½Π°Π²ΡΠ°Π½Π½Ρ Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠΌΡ ΡΠΎΠ·ΡΡΠ·Ρ;
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΉ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ Π΄Π»Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ;
- ΠΠ»Π°Π½ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡ.
- ΠΡΡΡ Π· Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΈΠΌ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΠΎΠΌ ΡΠ° Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ.
-
Β· 27 views Β· 1 application Β· 8d
Identity Access Management Specialist
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· English - None Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠ΅ΠΎΠ±Ρ ΡΠ΄Π½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° Π½Π°Π²ΠΈΡΠΊΠΈ:
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ², ΡΠΎΠ·ΠΌΠ΅ΠΆΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΡ, ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Π΄ΠΎ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π°Π±ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° IDM\IAM-ΡΠΈΡΡΠ΅ΠΌ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π½Π° Π°Π½Π°Π»ΠΎΠ³ΡΡΠ½ΡΠΉ ΠΏΠΎΠ·ΠΈΡΡΡ Π²ΡΠ΄ 1 ΡΠΎΠΊΡ.
Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π·Π΄ΡΠΉΡΠ½ΡΡΡΡΡΡ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Ρ k8s, GitLab, Π±Π°Π·Π°Ρ Π΄Π°Π½ΠΈΡ , AWS.
ΠΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ Π±ΡΠ΄Π΅:
- ΠΠ°ΡΠ²Π½ΡΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ β Certified Access Management Specialist (CAMS)
ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ°, ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ.
- Π£ΡΠ°ΡΡΡ Π² Π°ΡΠ΄ΠΈΡΡ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ².
ΠΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- ΠΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ
- Π¦ΡΠΊΠ°Π²Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ, ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠ° ΠΊΠ°Ρ'ΡΡΠ½ΠΎΠ³ΠΎ Π·ΡΠΎΡΡΠ°Π½Π½Ρ;
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΡΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ;
- Π‘ΡΡΠ°ΡΠ½ΠΈΠΉ ΠΎΡΡΡ ΡΠ° ΠΊΠΎΠΌΡΠΎΡΡΠ½Π΅ ΡΠΎΠ±ΠΎΡΠ΅ ΠΌΡΡΡΠ΅;
- Π ΡΠ·Π½Ρ ΠΏΠ°ΠΊΠ΅ΡΠΈ ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΠΉ ΡΠ° Π±ΠΎΠ½ΡΡΡΠ² Π·Π°Π»Π΅ΠΆΠ½ΠΎ Π²ΡΠ΄ ΡΡΠΈΠ²Π°Π»ΠΎΡΡΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ, ΡΠ΅ΡΠ΅Π΄ ΡΠΊΠΈΡ : ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ Π΄ΠΎ ΡΡΡΠ½ΠΈΡΡ ΡΠΎΠ±ΠΎΡΠΈ, ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π΄ΠΈΡΡΠ°Π΄ΠΊΠ°.
-
Β· 23 views Β· 1 application Β· 3d
Security Project Manager
Hybrid Remote Β· Ukraine Β· Product Β· 5 years of experience Β· English - NoneΠ‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ! MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ...Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ!
MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ ΠΠ΅Π½Π΅Π΄ΠΆΠ΅ΡΠ° Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π· ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΠ’ ΠΏΡΠΎΠ΅ΠΊΡΡΠ², ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΏΠ»Π°Π½ΡΠ²Π°Π½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΡΡΡΠ΅Π½Π½Ρ, ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡΠ² ΡΠ° ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ, Π°ΡΠ΄ΠΈΡΡ ΡΠ° ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΠΠ΅Π·ΠΏΠ΅ΠΊΠΈ (Π½Π°Π΄Π°Π»Ρ - ΠΠ).Π€ΡΠ½ΠΊΡΡΡ ΠΏΠΎΡΠ°Π΄ΠΈ:
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² ΠΠ Π² ΡΠ°ΠΌΠΊΠ°Ρ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΎΠ΅ΠΊΡΡΠ²
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΈ ΡΠ΅Ρ Π½ΡΡΠ½ΠΈΡ ΡΠ° Π±ΡΠ·Π½Π΅Ρ-ΡΡΡΠ΅Π½Ρ Π½Π° Π΅ΡΠ°ΠΏΡ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ°/Π°Π±ΠΎ Π΅ΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΡΡ Π½Π° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΡΡΡΡ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ ΠΠ
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠΎΡΠ΅ΡΡ Π· ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΠ
- Π£ΡΠ°ΡΡΡ Π² ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΠΠ
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΡΠΌΡΠ²Π°Π½Π½Ρ ΡΠ΄ΠΈΠ½ΠΈΡ Π²ΠΈΠΌΠΎΠ³ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄ΠΎ ΡΠΈΡΡΠ΅ΠΌ/ΡΠ΅ΡΠ²ΡΡΡΠ² ΠΠΎΠΌΠΏΠ°Π½ΡΡ
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΡΠ° ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π·Π°Ρ ΠΎΠ΄ΡΠ², ΡΠΏΡΡΠΌΠΎΠ²Π°Π½ΠΈΡ Π½Π° Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΎΠ³ΠΎ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΠΠΎΠΌΠΏΠ°Π½ΡΡ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ
ΠΠΎΠ½ΡΡΠ»ΡΡΡΠ²Π°Π½Π½Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π· ΠΏΠΈΡΠ°Π½Ρ ΠΠ
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠ±ΡΠ΄ΠΎΠ²ΡΠ²Π°Π½Π½Ρ ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΡΠΎΠ΅ΠΊΡΠ½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ, Π’Π, Π²ΠΈΠΌΠΎΠ³ΠΈ
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ ΡΠΈΠ·ΠΈΠΊΡΠ²
- ΠΡΡΠ½ΠΊΠ° ΡΠ° ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ, ΡΠ΅ΡΠ²Π΅ΡΡΠ², ΠΌΠ΅ΡΠ΅ΠΆ, Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Azure, AWS)
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ: VPN, MFA, PKI, SIEM, NAC, Π₯DR, DLP, WAF, IAM/IdM, CASB
- ΠΠ°Ρ ΠΈΡΡ ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ (Kubernetes, Docker), Π±Π΅Π·ΠΏΠ΅ΡΠ½Π΅ CI/CD
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ»Π°Π½ΡΠ² Π·Π½ΠΈΠΆΠ΅Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ² ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
- ΠΠ·Π°ΡΠΌΠΎΠ΄ΡΡ Π· Π°ΡΠ΄ΠΈΡΠΎΡΠ°ΠΌΠΈ (Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ/Π·ΠΎΠ²Π½ΡΡΠ½ΡΠΌΠΈ)
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°Π±ΠΎ ΡΡΠ°ΡΡΡ Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΊΠ°Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌ ΠΠ
- ΠΠ»ΠΈΠ±ΠΎΠΊΡ Π·Π½Π°Π½Π½Ρ Π² ΠΎΠ±Π»Π°ΡΡΡ ΡΡΠ΅Π½Π΄ΡΠ² ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ·, Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΈΡ ΡΠ½Π΄ΠΈΠΊΠ°ΡΠΎΡΡΠ² ΠΊΠΎΠΌΠΏΡΠΎΠΌΠ΅ΡΠ°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΈΡ ΡΠΏΠΎΡΠΎΠ±ΡΠ² ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ·
- ΠΠ½Π°Π½Π½Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ, ΡΠΎ ΡΠ΅Π³Π»Π°ΠΌΠ΅Π½ΡΡΡΡΡ ΠΏΠΈΡΠ°Π½Π½Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ (ΡΠ΅ΡΡΡ: ISO, NIST)
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ² ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡ, Π°Π»Π³ΠΎΡΠΈΡΠΌΡΠ² ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π· Π²ΡΠ΄ΠΊΡΠΈΡΠΈΠΌ ΡΠ° Π·Π°ΠΊΡΠΈΡΠΈΠΌ ΠΊΠ»ΡΡΠ΅ΠΌ
- ΠΠ½Π°Π½Π½Ρ Π±Π°Π·ΠΎΠ²ΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Π‘Π»ΡΠΆΠ±Π° ΠΊΠ°ΡΠ°Π»ΠΎΠ³ΡΠ², DNS, DHCP, Π€Π°ΠΉΠ»ΠΎΠ²Ρ ΡΠ΅ΡΠ²Π΅ΡΠΈ)
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ Zero Trust, defense-in-depth, risk-based approach
- ΠΠ½Π°Π½Π½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π²ΡΡΡΡΠ°Π»ΡΠ·Π°ΡΡΡ Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (VMware)
- ΠΠ½Π°Π½Π½Ρ Π±Π°Π·ΠΎΠ²ΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Π‘Π»ΡΠΆΠ±Π° ΠΊΠ°ΡΠ°Π»ΠΎΠ³ΡΠ², DNS, DHCP, Π€Π°ΠΉΠ»ΠΎΠ²Ρ ΡΠ΅ΡΠ²Π΅ΡΠΈ)
- ΠΠ±ΡΠΈΡΠ»ΡΠ²Π°Π»ΡΠ½Ρ ΠΌΠ΅ΡΠ΅ΠΆΡ ΡΠ° ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ: ΠΎΡΠ½ΠΎΠ²ΠΈ ΡΠΎΠΏΠΎΠ»ΠΎΠ³ΡΡ ΠΌΠ΅ΡΠ΅ΠΆ, ΠΎΡΠ½ΠΎΠ²Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ ΡΡΠ΅ΠΊΠ° TCP/IP (IP, TCP, UDP, HTTP/HTTPs)
ΠΠΎΠ½ΡΠ΅ΠΏΡΡΡ API (REST, gRPC, GraphQL)
Π£ΠΏΡΠ°Π²Π»ΡΠ½ΡΡΠΊΡ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠ½Π°Π»ΡΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ ΡΠ° Π·Π΄Π°ΡΠ½ΡΡΡΡ Π²ΠΈΡΡΡΡΠ²Π°ΡΠΈ ΡΠΊΠ»Π°Π΄Π½Ρ ΡΠ΅Ρ Π½ΡΡΠ½Ρ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈ
- ΠΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ° ΠΊΠΎΠΌΡΠ½ΡΠΊΡΠ²Π°ΡΠΈ Π· ΡΡΠ·Π½ΠΈΠΌΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»Π°ΠΌΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ
- ΠΡΠ³Π°Π½ΡΠ·ΠΎΠ²Π°Π½ΡΡΡΡ ΡΠ° ΡΠ²Π°Π³Π° Π΄ΠΎ Π΄Π΅ΡΠ°Π»Π΅ΠΉ ΠΏΡΠΈ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΠ°ΠΌΠΈ ΡΠ° ΠΊΠ»ΡΡΠ°ΠΌΠΈ
ΠΠ΄Π°ΡΠ½ΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ Π°Π΄Π°ΠΏΡΡΠ²Π°ΡΠΈΡΡ Π΄ΠΎ Π½ΠΎΠ²ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ²
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City, Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ)
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More -
Β· 33 views Β· 1 application Β· 4d
Account Manager
Office Work Β· Poland Β· Product Β· 1 year of experience Β· English - B2Π¨ΡΠΊΠ°ΡΠΌΠΎ ΡΠ²Π°ΠΆΠ½ΠΎΠ³ΠΎ ΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΎΠ³ΠΎ Account Manager β Π»ΡΠ΄ΠΈΠ½Ρ, ΡΠΊΠ° ΡΡΠΈΠΌΠ°Ρ Π²ΡΡ Π°ΠΊΠ°ΡΠ½ΡΠΈ ΠΏΡΠ΄ ΠΊΠΎΠ½ΡΡΠΎΠ»Π΅ΠΌ Ρ Π·Π½Π°Ρ, ΡΠΊ Π·ΡΠΎΠ±ΠΈΡΠΈ Ρ Π°ΠΎΡ Π²ΠΏΠΎΡΡΠ΄ΠΊΠΎΠ²Π°Π½ΠΈΠΌ. Π―ΠΊΡΠΎ ΡΠΈ Π»ΡΠ±ΠΈΡ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡ, ΡΠ°Π±Π»ΠΈΡΡ, Π»ΠΎΠ³ΡΠΊΡ ΡΠ° ΠΌΠ°ΡΡ ΠΎΠΊΠΎ Π½Π° Π΄Π΅ΡΠ°Π»Ρ β ΡΡ ΡΠΎΠ»Ρ ΡΠΎΡΠ½ΠΎ Π΄Π»Ρ ΡΠ΅Π±Π΅ InOvation β ΠΌΠΈ...Π¨ΡΠΊΠ°ΡΠΌΠΎ ΡΠ²Π°ΠΆΠ½ΠΎΠ³ΠΎ ΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΎΠ³ΠΎ Account Manager β Π»ΡΠ΄ΠΈΠ½Ρ, ΡΠΊΠ° ΡΡΠΈΠΌΠ°Ρ Π²ΡΡ Π°ΠΊΠ°ΡΠ½ΡΠΈ ΠΏΡΠ΄ ΠΊΠΎΠ½ΡΡΠΎΠ»Π΅ΠΌ Ρ Π·Π½Π°Ρ, ΡΠΊ Π·ΡΠΎΠ±ΠΈΡΠΈ Ρ Π°ΠΎΡ Π²ΠΏΠΎΡΡΠ΄ΠΊΠΎΠ²Π°Π½ΠΈΠΌ. Π―ΠΊΡΠΎ ΡΠΈ Π»ΡΠ±ΠΈΡ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡ, ΡΠ°Π±Π»ΠΈΡΡ, Π»ΠΎΠ³ΡΠΊΡ ΡΠ° ΠΌΠ°ΡΡ ΠΎΠΊΠΎ Π½Π° Π΄Π΅ΡΠ°Π»Ρ β ΡΡ ΡΠΎΠ»Ρ ΡΠΎΡΠ½ΠΎ Π΄Π»Ρ ΡΠ΅Π±Π΅
InOvation β ΠΌΠΈ ΡΠ΅ΠΊΡΡΡΠΈΠ½Π³ΠΎΠ²Π° Π°Π³Π΅Π½ΡΡΡ ΠΏΠΎΠ²Π½ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ, ΡΠΊΠ° Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡΠΌ Π·Π½Π°Ρ ΠΎΠ΄ΠΈΡΠΈ ΡΠ΄Π΅Π°Π»ΡΠ½ΠΈΠΉ ΠΌΠ΅ΡΡ Π· Π»ΡΠ΄ΡΠΌΠΈ. ΠΠΈ Π²ΡΡΠΈΠΌΠΎ, ΡΠΎ ΡΠΎΠ±ΠΎΡΠ° β ΡΠ΅ Π½Π΅ Π»ΠΈΡΠ΅ Π·Π°Π΄Π°ΡΡ, Π° ΠΉ Π³Π°ΡΠΌΠΎΠ½ΡΡ ΠΌΡΠΆ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ, ΡΠΎΠ·Π²ΠΈΡΠΊΠΎΠΌ Ρ ΡΡΠ½Π½ΠΎΡΡΡΠΌΠΈ
ΠΠ°Ρ ΠΠ»ΡΡΠ½Ρ
ΠΠΎΠΌΠ°Π½Π΄Π° - Π΄Π΅ ΠΊΠΎΠΆΠ΅Π½ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊ ΠΌΠΎΠΆΠ΅ Π½Π΅ ΡΡΠ»ΡΠΊΠΈ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ, Π°Π»Π΅ ΠΉ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ, ΠΎΡΡΠΈΠΌΡΡΡΠΈ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ ΡΠ° ΡΡΠ½ΡΡΡΠΈ Π²Π»Π°ΡΠ½ΠΈΠΉ Π±Π°Π»Π°Π½Ρ ΠΌΡΠΆ ΡΠΎΠ±ΠΎΡΠΎΡ ΡΠ° ΠΎΡΠΎΠ±ΠΈΡΡΠΈΠΌ ΠΆΠΈΡΡΡΠΌ. ΠΡΡΡΡΡ Π² ΡΠΈΠ»Ρ ΠΊΠ°ΠΉΠ΄Π·Π΅Π½ β ΠΏΠΎΡΡΡΠΉΠ½Π΅ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»Π΅Π½Π½Ρ, Π° ΡΠ°ΠΊΠΎΠΆ Ρ ΠΊΠΎΠΌΠ°Π½Π΄Π½Ρ ΡΠΎΠ±ΠΎΡΡ, Π΄Π΅ Π½ΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ ΠΏΡΠΈΠ½ΠΎΡΡΡΡ ΡΠ½ΡΠΊΠ°Π»ΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° ΡΠΏΡΠΈΡΡΡΡ ΠΎΡΠΎΠ±ΠΈΡΡΡΡΠ½ΠΎΠΌΡ ΡΠΎΡΡΡ
Π‘ΡΡΠ°ΡΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π°, ΡΠΊΠ° ΡΡΠ½ΡΡ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΡΡΡΡ ΡΠ° ΠΏΡΠΎΠ·ΠΎΡΡ ΠΏΡΠΎΡΠ΅ΡΠΈ. Π’ΡΡ Π²Π°ΠΆΠ»ΠΈΠ²Π° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ, ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡ Ρ Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π²Π΅Π»ΠΈΠΊΠΈΠΌΠΈ ΠΎΠ±ΡΡΠ³Π°ΠΌΠΈ Π΄Π°Π½ΠΈΡ . ΠΠΎΠ½ΠΈ ΡΡΠΊΠ°ΡΡΡ ΡΠ°Ρ ΡΠ²ΡΡ, ΡΠΊΠΈΠΉ Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ ΡΡΠΈΠΌΠ°ΡΠΈ ΠΏΡΠ΄ ΠΊΠΎΠ½ΡΡΠΎΠ»Π΅ΠΌ ΡΡΡ Π°ΠΊΠ°ΡΠ½ΡΠΈ, Π΄ΠΎΡΡΡΠΏΠΈ ΡΠ° Π²Π½ΡΡΡΡΡΠ½Ρ ΡΠΈΡΡΠ΅ΠΌΠΈ β ΡΠΎΠ± ΠΊΠΎΠΆΠ΅Π½ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊ ΠΌΡΠ³ ΡΠ²ΠΈΠ΄ΠΊΠΎ ΡΡΠ°ΡΡΡΠ²Π°ΡΠΈ ΠΉ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ
Π―ΠΊΡ Π·Π°Π΄Π°ΡΡ Π±ΡΠ΄Π΅Ρ ΡΠΎΠ±ΠΈΡΠΈ:
β ΡΡΠ²ΠΎΡΡΠ²Π°ΡΠΈ Π°ΠΊΠ°ΡΠ½ΡΠΈ Π΄Π»Ρ Π½ΠΎΠ²ΠΈΡ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² (Telegram, ΠΏΠΎΡΡΠ°, ΡΠΎΡΠΌΠ΅ΡΠ΅ΠΆΡ)
β Π²Π΅ΡΡΠΈ ΠΎΠ±Π»ΡΠΊ Π΄ΠΎΡΡΡΠΏΡΠ² Ρ Π²Π½ΡΡΡΡΡΠ½ΡΠΉ CRM
β ΡΡΠ²ΠΎΡΡΠ²Π°ΡΠΈ Π΄ΠΎΠ΄Π°ΡΠΊΠΎΠ²Ρ Π°ΠΊΠ°ΡΠ½ΡΠΈ Π·Π° Π·Π°ΠΏΠΈΡΠΎΠΌ
β Π²ΡΠ΄Π½ΠΎΠ²Π»ΡΠ²Π°ΡΠΈ Π°Π±ΠΎ ΡΠΎΠ·Π±Π»ΠΎΠΊΠΎΠ²ΡΠ²Π°ΡΠΈ Π΄ΠΎΡΡΡΠΏ Π΄ΠΎ Π°ΠΊΠ°ΡΠ½ΡΡΠ²
β ΡΠΈΡΡΠ΅ΠΌΠ°ΡΠΈΠ·ΡΠ²Π°ΡΠΈ ΡΠ° ΠΎΠ½ΠΎΠ²Π»ΡΠ²Π°ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ Π½ΠΎΠΌΠ΅ΡΠΈ ΠΉ SIM-ΠΊΠ°ΡΡΠΈΠ©ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ Π΄Π»Ρ ΡΡΡΡ ΡΠΎΠ»Ρ:
β ΡΠ²Π°ΠΆΠ½ΡΡΡΡ, ΡΡΡΡΠΊΡΡΡΠ½ΡΡΡΡ, Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π²Π΅Π»ΠΈΠΊΠΈΠΌ ΠΎΠ±ΡΡΠ³ΠΎΠΌ ΠΏΠΎΠ²ΡΠΎΡΡΠ²Π°Π½ΠΈΡ Π·Π°Π΄Π°Ρ
β Π°Π½Π°Π»ΡΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ ΡΠ° Π·Π΄Π°ΡΠ½ΡΡΡΡ ΠΏΠΎΠΌΡΡΠ°ΡΠΈ ΠΏΠΎΠΌΠΈΠ»ΠΊΠΈ
β Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Excel ΡΠ° Π· ΡΠΎΡΠΌΠ΅ΡΠ΅ΠΆΠ°ΠΌΠΈ
β Π²ΠΏΠ΅Π²Π½Π΅Π½ΠΈΠΉ ΠΊΠΎΡΠΈΡΡΡΠ²Π°Ρ ΠΠβΠ²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ Ρ ΡΡΡΠ΅ΡΠΎΡΡΡΠΉΠΊΡΡΡΡ
β Π²ΠΈΡΠ° ΠΎΡΠ²ΡΡΠ° Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡΠΠ΅ΡΠ΅Π²Π°Π³ΠΈ ΡΠΎΠ±ΠΎΡΠΎΠ΄Π°Π²ΡΡ:
β ΡΡΠ°Π±ΡΠ»ΡΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π°, ΡΠΊΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΡΡ Ρ Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°Ρ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ
β ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΊΡΡΡΡΠ² Π΄Π»Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡβ benefit Ρafe: Π°Π½Π³Π»ΡΠΉΡΡΠΊΠ°, ΡΠΏΠΎΡΡ, ΠΌΠ°ΡΠ°ΠΆ ΡΠΈ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³
β ΠΌΠ΅Π΄ΡΡΡΠ°Ρ ΠΎΠ²ΠΊΠ° Π΄Π»Ρ ΡΠΏΠΎΠΊΠΎΡ ΡΠ° Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ CRM ΡΠ° ΡΡ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡΠ²Π°ΡΠΈ
β ΡΠΎΠ±ΠΎΡΠ°, Π΄Π΅ ΡΡΠ½ΡΡΡΡ ΡΠΎΡΠ½ΡΡΡΡ Ρ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡΡΡΠ―ΠΊΡΠΎ ΡΠΈ Π²ΡΠ΄ΡΡΠ²Π°ΡΡ, ΡΠΎ ΡΠ΅ ΠΏΡΠΎ ΡΠ΅Π±Π΅ β Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ ΡΠ΅Π·ΡΠΌΠ΅ + ΠΊΡΠ»ΡΠΊΠ° ΡΠ»ΡΠ² ΠΏΡΠΎ ΡΠ΅Π±Π΅
More -
Β· 38 views Β· 6 applications Β· 23d
DevSecOps Engineer
Hybrid Remote Β· Ukraine Β· Product Β· 3 years of experience Β· English - B1Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ! MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ...Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ!
MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ DevSecOps ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ°, ΡΠΊΠΈΠΉ Π±ΡΠ΄Π΅ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΈΠΉ Π·Π° ΡΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΡΠΎΡΠ΅ΡΠΈ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΠ’-ΡΡΡΠ΅Π½Ρ. ΠΠΎΠ³ΠΎ Π·Π°Π²Π΄Π°Π½Π½Ρ Π²ΠΊΠ»ΡΡΠ°ΡΠΈΠΌΡΡΡ ΠΎΡΡΠ½ΠΊΡ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΏΡΠ΄ ΡΠ°Ρ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΎΡΠΊΡΡΠ², ΡΠΎΠ·ΡΠΎΠ±ΠΊΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ, ΠΏΡΠΎΡΠΊΡΡΠ²Π°Π½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΠΠ΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠ°ΠΌΠΈ ΡΠ° ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡΡ, Π° ΡΠ°ΠΊΠΎΠΆ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°ΡΠ΄ΠΈΡΡΠ² Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΠΆΠΈΡΡΡΠ²ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΡ.Π€ΡΠ½ΠΊΡΡΡ ΠΏΠΎΡΠ°Π΄ΠΈ:
- ΠΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² CI/CD β Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΎΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ.
- ΠΠ½Π°Π»ΡΠ· Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ β Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ½Π΅ ΡΠΊΠ°Π½ΡΠ²Π°Π½Π½Ρ ΠΊΠΎΠ΄Ρ, ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΡΠ², Π·Π°Π»Π΅ΠΆΠ½ΠΎΡΡΠ΅ΠΉ, ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ.
- ΠΠ΅ΡΡΠ²Π°Π½Π½Ρ ΡΠ΅ΠΊΡΠ΅ΡΠ°ΠΌΠΈ β Π±Π΅Π·ΠΏΠ΅ΡΠ½Π΅ Π·Π±Π΅ΡΡΠ³Π°Π½Π½Ρ ΠΊΠ»ΡΡΡΠ², ΡΠΎΠΊΠ΅Π½ΡΠ², ΠΏΠ°ΡΠΎΠ»ΡΠ².
- ΠΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ β ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² least privilege ΡΠ° Zero Trust.
- ΠΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ β Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ² Ρ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ°Ρ Dev/Test/Prod.
- ΠΠΎΠ»ΡΡΠΈΠΊΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ β ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΉ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·Π°ΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π΄Π»Ρ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° ΠΊΠΎΠ΄Ρ.
- ΠΠ°Π²ΡΠ°Π½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ β ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊΡΠ² ΡΠΎΠ΄ΠΎ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄ΡΠ²Π°Π½Π½Ρ.
ΠΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΡΡΡΡ ΡΡΠ°Π½Π΄Π°ΡΡΠ°ΠΌ β Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ NIST, ISO 27001, NIS2 ΡΠΎΡΠΎ.
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ½ΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ DevSecOps, ΡΡ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π² pipeline ΡΠΊ Security Gate.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·Π³ΠΎΡΡΠ°Π½Π½Ρ ΡΠ° Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ (SAST, DAST, SCA, ASOC, Container/Kubernetes Security).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ, ΠΏΡΠΎΠ΅ΠΊΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ΅Π½Π°ΡΡΡΠ² Π°ΡΠ°ΠΊ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ ΡΠ°ΠΊΡΠΈΠΊ ΡΠ° ΡΠ΅Ρ Π½ΡΠΊ MITRE ATT&CK.
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ ΡΠ°ΠΊΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ ΡΠΊ OWASP Security Standards, CIS Controls, NIST Cybersecurity Framework, SANS.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΠΉ Shift-Left, ZeroTrust, SSDLC;
- ΠΠ½Π°Π½Π½Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π· OWASP Top-10 (web/mobile/api), ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π²ΠΎΠ½ΠΈ Π²ΠΈΠ½ΠΈΠΊΠ°ΡΡΡ ΡΠ° ΡΠΊ ΠΌΠΈΡΡΠ³ΡΡΡΡΡΡ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΡΠ°ΠΆΡ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π² ΡΠ°ΠΊΠΈΡ ΠΌΠΎΠ²Π°Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΡΠ²Π°Π½Π½Ρ (Ρ ΠΎΡΠ° Π± ΠΌΡΠ½ΡΠΌΠ°Π»ΡΠ½ΠΈΠΉ): Python, Java, JS, PHP, .NET.
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ² Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Azure AWS, K8s.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΠ°Ρ Azure (Azure Security Center, Azure Defender, Azure Policy), AWS (GuardDuty, CloudTrail), GCP.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· key vault, hashicorp vault, BYOK.
- ΠΠ½Π°Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΡΡΡΠΊΡΡΡ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ/Π°Π²ΡΠΎΡΠΈΠ·Π°ΡΡΡ (OAuth 2.0, OIDC, JWT).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΠΎΠ΄Π½ΠΈΠΌ Π°Π±ΠΎ Π΄Π΅ΠΊΡΠ»ΡΠΊΠΎΠΌΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ CI/CD (Azure DevOps, Gitlab, Ansible, Terraform).
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ ΡΠ· ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ ΠΊΠΎΠ»Π΅ΠΊΡΠΈΠ²Π½ΠΎΡ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ, Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ² ΡΠ° ΡΠ΅ΠΏΠΎΠ·ΠΈΡΠΎΡΡΡΠ² (AzDO, Git, Confluence, Jira).
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City, Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ)
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More -
Β· 134 views Β· 8 applications Β· 4d
ΠΠ΅Π½Π΅Π΄ΠΆΠ΅Ρ Π· ΠΠ’-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Hybrid Remote Β· Ukraine Β· Product Β· 5 years of experience Β· English - B1ΠΠ΅Π½Π΅Π΄ΠΆΠ΅Ρ Π· ΠΠ’-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΌ. ΠΠΈΡΠ² | ΠΎΡΡΡ (Π³ΡΠ±ΡΠΈΠ΄ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΈΠΉ) ΠΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ + ΠΎΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ ΠΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΠΠ°Ρ ΠΊΠ»ΡΡΠ½Ρ β Π²Π΅Π»ΠΈΠΊΠ΅ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ΅ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²ΠΎ Π· ΠΏΠΎΡΡΠΆΠ½ΠΈΠΌ ΠΠ’-Π½Π°ΠΏΡΡΠΌΠΎΠΌ, ΡΠΊΠ΅ Π°ΠΊΡΠΈΠ²Π½ΠΎ ΡΠ½Π²Π΅ΡΡΡΡ Ρ ΡΠΈΡΡΠΎΠ²Ρ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Ρ...ΠΠ΅Π½Π΅Π΄ΠΆΠ΅Ρ Π· ΠΠ’-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
ΠΌ. ΠΠΈΡΠ² | ΠΎΡΡΡ (Π³ΡΠ±ΡΠΈΠ΄ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΈΠΉ)
ΠΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ + ΠΎΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½ΡΠΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ
ΠΠ°Ρ ΠΊΠ»ΡΡΠ½Ρ β Π²Π΅Π»ΠΈΠΊΠ΅ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ΅ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²ΠΎ Π· ΠΏΠΎΡΡΠΆΠ½ΠΈΠΌ ΠΠ’-Π½Π°ΠΏΡΡΠΌΠΎΠΌ, ΡΠΊΠ΅ Π°ΠΊΡΠΈΠ²Π½ΠΎ ΡΠ½Π²Π΅ΡΡΡΡ Ρ ΡΠΈΡΡΠΎΠ²Ρ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΠΈ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ.
ΠΠΎΠΌΠΏΠ°Π½ΡΡ ΠΌΠΎΠ΄Π΅ΡΠ½ΡΠ·ΡΡ ΡΠ²ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ, ΡΠΎΠ·Π²ΠΈΠ²Π°Ρ Π²Π»Π°ΡΠ½ΠΈΠΉ SOC, ΠΏΠΎΡΠΈΠ»ΡΡ ΡΠΈΡΡΠ΅ΠΌΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΡΠΊΠ°Ρ ΡΠ°Ρ ΡΠ²ΡΡ, ΡΠΊΠΈΠΉ Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ Π·ΡΠΎΠ±ΠΈΡΠΈ ΡΠ΅ΠΉ ΡΡΠ½Π΄Π°ΠΌΠ΅Π½Ρ ΡΠ΅ Π½Π°Π΄ΡΠΉΠ½ΡΡΠΈΠΌ.
ΠΡΡΡΡ ΡΠΎΠ»Ρ β Π·Π°Ρ ΠΈΡΡΠΈΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Ρ Π°ΠΊΡΠΈΠ²ΠΈ, Π΄Π°Π½Ρ ΡΠ° Π±ΡΠ·Π½Π΅Ρ-ΠΏΡΠΎΡΠ΅ΡΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΠΏΡΠ°ΡΡΡ Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡΠ½ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎΠΌΡ Π΄Π»Ρ ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ΅ΠΊΡΠΎΡΡ.
Π©ΠΎ Π²ΠΈ ΡΠΎΠ±ΠΈΡΠΈΠΌΠ΅ΡΠ΅
- Π ΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΈΠΌΠ΅ΡΠ΅ ΡΠ° ΡΠ΅Π°Π»ΡΠ·ΠΎΠ²ΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΠ’-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π·Π³ΡΠ΄Π½ΠΎ Π· ISO 27001, NIST ΡΠ° ΡΠ½ΡΠΈΠΌΠΈ ΡΡΠ°Π½Π΄Π°ΡΡΠ°ΠΌΠΈ.
- ΠΠ΅ΡΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SOC, SIEM, EDR, DLP, PAM, VPN, MFA) β Π²ΡΠ΄ Π°Π½Π°Π»ΡΡΠΈΠΊΠΈ Π΄ΠΎ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ.
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ Π·Π°Ρ ΠΈΡΡ Ρ ΠΌΠ°ΡΠ½ΠΈΡ Ρ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ΡΠ΅Π³ΠΌΠ΅Π½ΡΠ°ΡΡΡ OT/IT.
- ΠΡΠΎΠ²ΠΎΠ΄ΠΈΡΠΈΠΌΠ΅ΡΠ΅ Π°ΡΠ΄ΠΈΡΠΈ, ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ², Π°Π½Π°Π»ΡΠ· Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ CMDB.
- ΠΠΎΠΎΡΠ΄ΠΈΠ½ΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ ΠΏΡΠΎΡΠ΅ΡΠΈ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ: Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, ΡΠΎΠ·ΡΠ»ΡΠ΄ΡΠ²Π°Π½Π½Ρ, ΡΡΡΠ½Π΅Π½Π½Ρ, ΠΏΠΎΡΡ-Π°Π½Π°Π»ΡΠ·.
- ΠΡΠ΄Π²ΠΈΡΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ ΡΡΠ²Π΅Π½Ρ ΠΊΡΠ±Π΅ΡΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ² ΡΠ΅ΡΠ΅Π· ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΡΠΈΠΌΡΠ»ΡΡΡΡ ΡΡΡΠΈΠ½Π³ΠΎΠ²ΠΈΡ Π°ΡΠ°ΠΊ ΡΠΎΡΠΎ.
- Π‘ΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ Π· Π±ΡΠ·Π½Π΅Ρ-ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»Π°ΠΌΠΈ, ΡΠ½ΡΠ΅Π³ΡΡΡΡΠΈ Π²ΠΈΠΌΠΎΠ³ΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π΅ΡΠ°ΠΏΡ ΠΏΡΠΎΡΠΊΡΡΠ²Π°Π½Π½Ρ Π½ΠΎΠ²ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ.
ΠΠΈ ΡΠ΄Π΅Π°Π»ΡΠ½ΠΈΠΉ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ, ΡΠΊΡΠΎ:
- ΠΠ°ΡΡΠ΅ 5+ ΡΠΎΠΊΡΠ² Π΄ΠΎΡΠ²ΡΠ΄Ρ Ρ ΡΡΠ΅ΡΡ ΠΠ’ Π°Π±ΠΎ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΠ±ΡΠ΅ ΠΎΡΡΡΠ½ΡΡΡΡΠ΅ΡΡ Ρ SOC, SIEM, EDR, DLP, PAM ΡΡΡΠ΅Π½Π½ΡΡ Ρ Π²ΠΌΡΡΡΠ΅ ΡΡ Π°Π΄Π°ΠΏΡΡΠ²Π°ΡΠΈ ΠΏΡΠ΄ ΡΡΠ·Π½Ρ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ°.
- Π ΠΎΠ·ΡΠΌΡΡΡΠ΅ ΡΠ΅Π³ΠΌΠ΅Π½ΡΠ°ΡΡΡ OT/IT, ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈ Π·Π°Ρ ΠΈΡΡΡ ΠΏΡΠΎΠΌΠΈΡΠ»ΠΎΠ²ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ.
- ΠΠ½Π°ΡΡΠ΅ ISO 27001, NIST, GDPR Π°Π±ΠΎ ΠΏΠΎΠ΄ΡΠ±Π½Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΠΈ.
- ΠΠ°ΡΡΠ΅ Π΄ΠΎΡΠ²ΡΠ΄ Π°ΡΠ΄ΠΈΡΡΠ², ΡΠ΅ΡΡΡΠ² Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ, ΡΠΎΠ±ΠΎΡΠΈ Π· CMDB.
- Π‘Π΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ Π½Π° ΠΊΡΡΠ°Π»Ρ CISSP, CISM, CEH, ISO 27001 LA Π±ΡΠ΄ΡΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ.
- ΠΠΌΡΡΡΠ΅ ΠΏΠ΅ΡΠ΅ΠΊΠ»Π°Π΄Π°ΡΠΈ ΡΠΊΠ»Π°Π΄Π½Ρ ΡΠ΅Ρ Π½ΡΡΠ½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΡ Ρ Π·ΡΠΎΠ·ΡΠΌΡΠ»Ρ Π±ΡΠ·Π½Π΅Ρ-ΡΡΡΠ΅Π½Π½Ρ.
ΠΠΎΠΌΠΏΠ°Π½ΡΡ ΠΏΡΠΎΠΏΠΎΠ½ΡΡ:
- Π£ΡΠ°ΡΡΡ Ρ ΠΌΠ°ΡΡΡΠ°Π±Π½ΠΈΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΠΏΡΠΎΡΠΊΡΠ°Ρ Ρ ΡΡΠ΅ΡΡ ΠΠ’ ΡΠ° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΡΡΡ, ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π²Π°ΡΡΠΎΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ ΡΠ° Π½Π°Π²ΡΠ°Π½Π½Ρ.
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ, ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ, ΠΏΠΎΠ²Π½ΠΈΠΉ ΡΠΎΡΠΏΠ°ΠΊΠ΅Ρ.
- Π‘ΡΠ°Π±ΡΠ»ΡΠ½ΡΡΡΡ Π²Π΅Π»ΠΈΠΊΠΎΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π·Ρ Π·ΡΡΠ»ΠΈΠΌΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ ΡΠ° ΡΡΡΠ°ΡΠ½ΠΈΠΌΠΈ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠΌΠΈ.
- ΠΡΡΡ Ρ ΠΠΈΡΠ²Ρ, Π³ΡΠ±ΡΠΈΠ΄Π½Π° ΠΌΠΎΠ΄Π΅Π»Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²Π°.
ΠΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ Π΄Π»Ρ Π²ΡΠΉΡΡΠΊΠΎΠ²ΠΎΠ·ΠΎΠ±ΠΎΠ²βΡΠ·Π°Π½ΠΈΡ .
Π―ΠΊΡΠΎ Π²ΠΈ ΡΡΠΊΠ°ΡΡΠ΅ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ΅, Π΄Π΅ Π±Π΅Π·ΠΏΠ΅ΠΊΠ° β Π½Π΅ Π±ΡΡΠΎΠΊΡΠ°ΡΡΡ, Π° ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ½Π΅ ΠΌΠΈΡΡΠ΅ΡΡΠ²ΠΎ, Π΄Π΅ Π²Π°ΡΠ° ΡΠΎΠ±ΠΎΡΠ° Π²ΠΏΠ»ΠΈΠ²Π°ΡΠΈΠΌΠ΅ Π½Π° ΡΡΡΠΉΠΊΡΡΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΈΡ ΠΏΡΠΎΡΠ΅ΡΡΠ² β ΠΏΡΠΈΡΠ΄Π½ΡΠΉΡΠ΅ΡΡ Π΄ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΊΠ° ΡΠΎΠ΄Π½Ρ ΡΡΠ²ΠΎΡΡΡ Ρ Π·Π°Ρ ΠΈΡΠ°Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΡ.
More
- 1
- 2