Jobs
22-
Β· 40 views Β· 3 applications Β· 28d
Security Engineer
Full Remote Β· Ukraine Β· Product Β· 3 years of experience Β· Upper-IntermediateWe are inviting you, a highly motivated and results-oriented Security Engineer to join our team for ensuring and developing solutions, as well as strengthening the product infrastructure. Our team has unique expertise in research, analysis, and product...We are inviting you, a highly motivated and results-oriented Security Engineer to join our team for ensuring and developing solutions, as well as strengthening the product infrastructure.
Our team has unique expertise in research, analysis, and product development. By relying on technical insights and a data-driven approach, we create disruptive future-defining innovations of the fin-tech industry that remain our basis for success.
Responsibilities
- Develop, implement, maintain, upgrade, and test cybersecurity products
- Provide cybersecurity-related support to users and customers
- Integrate cybersecurity solutions into systems and services, ensuring their stability and performance
- Securely configure systems, services, and products
- Maintain and upgrade the security of systems, services, and products
- Implement cybersecurity procedures and controls
- Monitor and ensure the performance of the implemented cybersecurity controls
- Document and report on the security of systems, services, and products
- Work closely with the Engineering teams on cybersecurity-related actions
- Implement, apply, and manage patches to products to address technical vulnerabilities
Requirements
- 3+ years of experience in information security and cybersecurity roles
- Background in development, DevOps, system administration, etc.
- Hands-on experience in developing, integrating, and testing security solutions
- Experience with vulnerability analysis and incident response
- Proficiency in scripting languages such as Python, Bash, PowerShell, etc
- Solid understanding of secure development lifecycle, operating system security, and computer network security
- Experience with both offensive and defensive security practices
- Knowledge of cybersecurity controls, solutions, and technologies
- Ability to collaborate with cross-functional teams and colleagues
- Effective communication and presentation skills to report to stakeholders
- Strong analytical and problem-solving skills
- Reliability, integrity, and responsibility in handling sensitive information and security tasks
Upper-Intermediate English
Will be a plus
- Experience with Ruby, Go, or other programming languages
Security certifications
We offer
- Compensation for tax expenses of private entrepreneurs in Ukraine
- Qualified assistance and support for Ukrainian private entrepreneurs
- 10 paid sick leave days per year
- 20 paid vacation days per year
- Public holidays according to current Ukrainian legislation
- Medical insurance for employees
- Compensation for professional education and learning English
- Compensation for a sports subscription or sports equipment
-
Β· 44 views Β· 3 applications Β· 19d
Digital Operations Specialist
Full Remote Β· Ukraine Β· Product Β· 1 year of experience Β· IntermediateWe're looking for a detail-oriented Digital Operations Specialist to manage internal tools and ensure secure, streamlined operations across Google Workspace, Slack, Notion, and Telegram. Responsibilities: Manage Google Domains, Slack, Notion, Telegram...We're looking for a detail-oriented Digital Operations Specialist to manage internal tools and ensure secure, streamlined operations across Google Workspace, Slack, Notion, and Telegram.
Responsibilities:
- Manage Google Domains, Slack, Notion, Telegram accounts
- Handle onboarding/offboarding across all systems.
- Maintain and update the access control schema.
- Perform regular security audits and monitor workspace activity.
- Prepare security and cost reports for management.
Requirements:
- Proven experience with Google Workspace, Slack, Notion, and Telegram.
- Solid understanding of access management and information security.
- Strong organizational skills and attention to detail.
- Ability to automate and document routine processes.
- English level: Intermediate+
KPIs:
- Full separation of domains and accounts across departments.
- Onboarding within 24 hours; offboarding within 2 hours.
- Quarterly access audits.
- Zero incidents of unauthorized access.
What we offer:
- We offer a competitive salary that matches your skills and experience;
- Work from anywhere and keep a good work-life balance;
- Paid vacation and sick leave;
- Work with a supportive and creative team.
-
Β· 34 views Β· 5 applications Β· 27d
Team Lead Privacy and Access management
Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 4 years of experienceFAVBET Tech develops software that is used by millions of players around the world for the international company FAVBET Entertainment. We develop innovations in the field of gambling and betting through a complex multi-component platform which is capable...FAVBET Tech develops software that is used by millions of players around the world for the international company FAVBET Entertainment.
We develop innovations in the field of gambling and betting through a complex multi-component platform which is capable to withstand enormous loads and provide a unique experience for players.
FAVBET Tech does not organize and conduct gambling on its platform. Its main focus is software development.Main areas of work:
- Betting/Gambling Platform Software Development β software development that is easy to use and personalized for each customer;
- Highload Development β development of highly loaded services and systems;
- CRM System Development β development of a number of services to ensure a high level of customer service, effective engagement of new customers and retention of existing ones;
- Big Data β development of complex systems for processing and analysis of big data;
- Cloud Services β we use cloud technologies for scaling and business efficiency.
Responsibilities:
- Implementation and development of access management systems and confidential information protection technologies (IAM, PAM, MFA, DLP, etc.) across on-premises and cloud infrastructures, including the use of AI and Zero Trust principles.
- Ensuring detection, response, and analysis of security incidents. Development and implementation of corrective and preventive measures and controls.
- Implementation and development of approaches (RBAC, SoD) and processes for managing the access lifecycle.
- Ensuring protection of identification and authentication processes.
- Implementation and enhancement of processes and mechanisms for the inventory, labeling, and destruction of confidential and personal data.
- Ensuring the security of databases.
- Participation in strategic planning and definition of development directions.
- Participation in risk assessment processes and audits.
- Contribution to the development and implementation of internal regulatory documentation.
Skills:
- At least 3 years of experience in information security, including 1 year in a managerial position.
- In-depth knowledge of access management processes and confidential data protection, principles of privileged access security, and secure authentication mechanisms.
- Experience with the implementation and use of identity, access, and data protection management systems.
- Knowledge and experience with IT/IS services in AWS, Azure, and virtualization platforms.
- Understanding of the Zero Trust concept and principles of secure architecture design.
- Knowledge and practical skills in incident management.
- Experience in using and securing database management systems (DBMS).
- General understanding of network security principles.
- Knowledge of GDPR requirements.
- Experience in project and change management.
- English proficiency β upper-intermediate level or higher.
Preferred Qualifications:
- Knowledge of international standards such as ISO 27001, PCI DSS.
- Relevant information security certifications.
- Experience in risk assessment.
- Practical automation skills (Python, PowerShell, etc.).
We can offer:
- 30 days off per year (vacation and sick days) β we value rest and recreation. We also comply with the national holidays.
- Medical insurance for employees and the possibility of training employees at the expense of the company and gym membership.
- Remote work; after Ukraine wins the war β our own modern lofty office with spacious workplace, and brand-new work equipment (near Pochaina metro station).
- Flexible work schedule β we expect a full-time commitment but do not track your working hours.
- Flat hierarchy without micromanagement β our doors are open, and all teammates are approachable.
During the war, the company actively supports the Ministry of Digital Transformation of Ukraine in the initiative to deploy an IT army and has already organized its own cyber warfare unit, which makes a crushing blow to the enemyβs IT infrastructure 24/7, coordinates with other cyber volunteers and plans offensive actions on its IT front line.
More -
Β· 56 views Β· 5 applications Β· 21d
Head of IT Operations, Infrastructure and Security
Full Remote Β· Poland Β· 5 years of experience Β· Upper-IntermediateWe are seeking a Head of IT Operations, Infrastructure and Security to oversee our technology operations and security infrastructure efforts. The ideal candidate will be responsible for the companyβs global IT infrastructure, including configuration...We are seeking a Head of IT Operations, Infrastructure and Security to oversee our technology operations and security infrastructure efforts. The ideal candidate will be responsible for the companyβs global IT infrastructure, including configuration management, software selection, and administration while ensuring compliance with security certifications and standards. With experience in the professional services sector and deep knowledge of IT outsourcing, the Head of IT Operations, Infrastructure and Security will be pivotal in setting up appropriate infrastructure solutions, safeguarding the organization's information assets, and addressing client security and infrastructure needs.
Location: Poland (Wroclaw preferred)
Key Responsibilities:
- Management & IT Strategy
- Lead the IT department, defining strategic goals that align with business objectives.
- Drive technology innovation, process improvements, and cost-effective solutions.
- Manage the selection, configuration, and deployment of enterprise-level software and systems.
- Security Management
- Oversee the organizationβs security strategy, ensuring compliance with industry standards and regulations such as ISO 27001, SOC 2, or others relevant to professional services and IT outsourcing.
- Lead initiatives for security certifications and audits, working closely with external auditors and internal teams to ensure preparedness and compliance.
- Identify and mitigate IT security risks, implementing proactive measures to safeguard data and infrastructure.
- Client-Facing Responsibilities
- Advise on appropriate IT infrastructure and security set up and configurations for Proxet engineering teams in light of specific client requirements or data sensitivity.
- Support the Presales team in crafting tailored infrastructure and security solutions that meet client-specific compliance and operational requirements.
- Participate in client calls and security due diligence sessions, ensuring alignment between client expectations and internal delivery capabilities.
- Provide leadership in designing and documenting infrastructure blueprints, access policies, and security practices for client environments.
- Partner with Delivery teams to troubleshoot, upgrade, or redesign infrastructure/security setups based on evolving client needs.
- Vendor Evaluation & Management
- Evaluate, select, and manage third-party vendors for software, infrastructure, and security solutions, ensuring alignment with the company's strategic goals.
- Conduct thorough assessments of vendors' security practices, compliance with certifications, and their fit within the organizationβs IT landscape.
- IT Operations & Administration
- Oversee daily IT operations, ensuring the stability, performance, and scalability of the organization's IT systems.
- Implement best practices for IT service management (ITSM), including configuration, change, and incident management.
- Manage budgets, forecasts, and vendor contracts to ensure cost-effectiveness and value for the organization.
- Responsibility for global procurement and set up of hardware and software in the companyβs global locations in an efficient manner.
- Professional Services & IT Outsourcing
- Develop and maintain an understanding of the professional services domain and IT outsourcing sector to provide informed recommendations and strategic input.
- Collaborate with internal stakeholders to support client needs, delivering robust IT solutions that support service delivery.
- Evaluate potential outsourcing partners and ensure the seamless integration of outsourced services with internal IT functions.
- Team Management & Development
- Lead and mentor a team of IT professionals, fostering growth, skill development, and operational excellence.
- Promote a culture of continuous improvement, collaboration, and accountability across the IT organization.
- Communication & Collaboration
- Interdepartmental collaboration skills and ability to work globally with engineering delivery teams located in Europe, Latin America and the United States.
- Ability to be responsive and provide practical solutions to client security and IT requirements
Strong English language skills
Qualifications:
- Bachelorβs degree in Information Technology, Computer Science, or a related field (Masterβs degree preferred).
- 6-8+ years of experience in IT management, with a minimum of 2-3 years focused on IT security and compliance.
- Proven track record of managing IT infrastructure, including configuration management, software selection, and overseeing IT administration.
- Strong experience in security certification processes such as ISO 27001, SOC 2, or NIST standards.
- Extensive experience in interacting with U.S.-based clients on security and infrastructure solutions for the companyβs engineering teams.
- Experience in professional services and IT outsourcing in setting up efficient and appropriate IT and security frameworks, vendor evaluation and third-party risk management.
- Excellent problem-solving and decision-making abilities, with a focus on business outcomes and risk mitigation.
- Collaborative in working across multiple departments.
Certifications (Preferred):
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- ITIL, PMP, or other relevant certifications
Key Competencies:
- Strategic Thinking & Leadership
- IT Security & Risk Management
- Client-Facing Skillset
- Vendor Management & Evaluation
- Communication & Collaboration
- Management & IT Strategy
-
Β· 53 views Β· 1 application Β· 20d
Security Risk Manager
Full Remote Β· Ukraine Β· Product Β· 5 years of experience Β· IntermediateWe are inviting you, a highly motivated and results-oriented Security Risk Manager to join our team on a full-time basis. Our team has unique expertise in research, analysis, and product development. By relying on technical insights and a data-driven...We are inviting you, a highly motivated and results-oriented Security Risk Manager to join our team on a full-time basis.
Our team has unique expertise in research, analysis, and product development. By relying on technical insights and a data-driven approach, we create disruptive future-defining innovations of the fin-tech industry that remain our basis for success.
Responsibilities
- Develop and maintain the organizationβs cybersecurity risk management strategy
- Manage and audit the inventory of organizational assets
- Identify and assess cybersecurity-related threats and vulnerabilities across ICT systems
- Analyze the threat landscape, including attacker profiles and potential attack vectors
- Assess cybersecurity risks and propose effective risk treatment options, including security controls and mitigation strategies
- Monitor and evaluate the effectiveness of cybersecurity controls and overall risk posture
- Ensure all cybersecurity are maintained at acceptable level in accordance with organizational policies
- Develop and maintain the complete cybersecurity risk management cycle
- Establish and maintain compliance reporting processes and support security audits
Requirements
- 3+ years of recent experience in Security Risk Management or GRC roles
- 4+ years of prior experience in cybersecurity and compliance options
- Proven experience with cybersecurity risk management standards and frameworks
- Strong knowledge of cyber threats, system vulnerabilities, and security best practices
- Proficiency in using risk assessment and risk management tools
- Understanding of cybersecurity controls and their implementation
- Ability to monitor, test, and evaluate the effectiveness of security controls
Will be a plus
- Experience in fintech domain
- Certifications (CISSP, CISM, CRISC, ISO 27001 etc.)
- Technical background in infrastructure (networks, servers, cloud systems)
We offer
- Tax expenses coverage for private entrepreneurs in Ukraine
- Expert support and guidance for Ukrainian private entrepreneurs
- 20 paid vacation days per year
- 10 paid sick leave days per year
- Public holidays as per the companyβs approved Public holiday list
- Medical insurance
- Opportunity to work remotely
- Professional education budget
- Language learning budget
- Wellness budget (gym membership, sports gear and related expenses)
-
Β· 45 views Β· 4 applications Β· 7d
Security Engineer
Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 5 years of experience Β· Upper-IntermediateJob Description We are seeking a Security Engineer who will be responsible for both the technical implementation and ongoing development of our information security practices. You will define and execute security strategies, ensure the protection of...Job Description
We are seeking a Security Engineer who will be responsible for both the technical implementation and ongoing development of our information security practices. You will define and execute security strategies, ensure the protection of infrastructure and data, support secure software development processes, and raise security awareness across the team.
Responsibilities
- Develop and implement information security strategies, including risk assessments and the creation of key policies and procedures.
- Deploy and operate SIEM systems, integrate log sources, and build correlation and alerting rules.
- Monitor security events and respond to incidents, including root cause analysis and post-incident reviews.
- Ensure application security by implementing secure software development lifecycle (SSDLC) practices and integrating vulnerability scanning tools (SAST/DAST) into CI/CD pipelines.
- Manage cloud and network security, including firewall configuration, VPN setup, IDS/IPS tuning, access control, and network segmentation.
- Protect endpoints and servers by deploying EDR solutions, hardening systems, and managing patch/update processes.
- Design and maintain access control processes, implement IAM solutions, and enforce least privilege principles.
- Deliver training and awareness programs on cybersecurity best practices, including phishing simulations.
- Support compliance and audit readiness for standards.
Requirements
Hard Skills:
- Deep understanding of cybersecurity principles and standards (OWASP, NIST, ISO 27001), with proven practical implementation.
- Hands-on experience with SIEM systems, log ingestion, and alert creation.
- Solid knowledge of networking protocols and architectures (TCP/IP, DNS, HTTPS, VPN, Firewalls), including traffic analysis and policy enforcement.
- Experience with vulnerability management, SAST/DAST integration, and penetration testing.
- Proficiency in cloud security for platforms like AWS, GCP, or Azure, including access control, encryption, and monitoring.
- Endpoint security experience: EDR deployment, system audits, patch management, and configuration hardening.
- Knowledge of SSO/SAML/OIDC and centralized authentication implementations.
- Server security hardening (Linux/Windows) and secret management.
Soft Skills:
- Strong analytical thinking and attention to detail.
- Ability to communicate complex security concepts clearly to developers, DevOps, and support teams.
- Proactive mindset, ownership of tasks and initiatives.
- High level of self-organization and ability to work under uncertainty and in multitasking environments.
- English- Upper - Intermediate.
Nice to have
- Scripting skills (Python, Bash) for automation.
- Familiarity with CI/CD tools (Jenkins, GitHub Actions) and DevSecOps practices.
- Experience with Kubernetes security (image scanning, OPA, PodSecurityPolicy).
- Background in startups or fast-paced technology environments.
Benefits
- Competitive and attractive compensation.
- Remote work schedule.
- Proper rest time of 24 annual leave days.
- Challenging and unique tasks in the FinTech field.
- Funding for gym memberships, fostering a healthy work-life balance.
Interview Stages
- Interview with HR Manager (1 hour)
- Interview with Hiring Manager (1.5 hours)
- Reference Check
-
Β· 40 views Β· 2 applications Β· 6d
Senior Cybersecurity Specialist
Ukraine Β· 5 years of experience Β· Upper-IntermediateWe seek a highly skilled Senior Cybersecurity Specialist to join Sombraβs Cybersecurity team. The ideal candidate will have experience in cybersecurity operations and a passion for various security domains (network, application, data, etc.). ...We seek a highly skilled Senior Cybersecurity Specialist to join Sombraβs Cybersecurity team. The ideal candidate will have experience in cybersecurity operations and a passion for various security domains (network, application, data, etc.).
Requirements:
Knowledge and Experience:
- 4+ years of experience in SOC, information security management team, blue team or similar.
- 7+ years of experience in the IT industry.
- Team leadership experience is a great plus.
- Solid understanding of enterprise technologies and security tooling landscape.
- Deep understanding of security practices, like incident management, vulnerability management, etc.
- Knowledge of modern application architecture (microservices/cloud / asynchronous communication) and threat landscape.
- General knowledge of application vulnerabilities and related issues.
Professional certifications, such as CISSP, CISM, and similar.
Personal Attributes:- Fluent in English and Ukrainian.
- Quick starter and learner.
- Readiness to research, investigate, and adjust to organizational needs.
- Intuition and keen instincts to pre-empt attacks.
- High level of analytical and problem-solving abilities.
- Strong interpersonal and oral communication skills.
Skillsets:
Ideally knowledge of cybersec tooling: - Endpoint protection toolset (e.g. CrowdStrike, Defender, etc.)
- Familiarity with monitoring tools and SIEM solutions (e.g. QRadar, Azure Sentinel, etc.).
- Network and vulnerability scanners (e.g. Qualys, Rapid7, Nessus, etc.).
- Cloud experience (in particular Azure).
- Experience with BurpSuite is a big plus.
Responsibilities:
Define the measures and processes to mitigate cybersecurity risks, including:
1) Monitor security events and alerts from multiple sources.
2) Analyze and investigate security incidents and events to determine the root cause. 3) Conduct risk assessments to identify vulnerabilities and potential threats.
3) Participate in incident response activities, including triage, containment, and remediation.
4) Develop and maintain security documentation, procedures, and guidelines.
5) Conduct vulnerability assessments and penetration testing.
6) Collaborate with other teams to ensure the organizationβs systems and infrastructure security.- Participate in corporate-wide processes on behalf of the cybersecurity team, such as access provisioning, change management, awareness training, etc.
- Take the leading role in SIEM implementation project.
- Be responsible for cybersecurity tools administration.
We offer:
- Annual paid vacation of 18 working days.
- Extra vacation days for long-lasting cooperation.
- Annual paid sick leave of 10 days.
- Maternity/Paternity leave.
- The opportunity for sabbatical leave.
- Marriage and Parenthood Package.
- Compensation for sports activities (up to 250$ per year) or health insurance covering (70%) β after the trial period.
- Internal education (corporate library, Udemy courses).
- Career development plan.
- English and Spanish classes.
- Paying taxes and managing PE (Private Entrepreneur).
- Technical equipment.
- Internal Referral program.
- Opportunity to take part in company volunteering activities.
- Sombra is a βFriendly to Veteransβ award holder.
If you believe you are a suitable candidate for this position, please attach your updated resume using the provided link.
More
Our recruitment team will review your profile, and if it aligns with our current job openings, we will contact you shortly. If you donβt receive a reply from us within 5 business days, it means we have decided to move forward with other candidates.
Thank you for understanding. -
Β· 37 views Β· 3 applications Β· 29d
Chief Information Security Officer
Full Remote Β· Ukraine Β· Product Β· 5 years of experienceΠΠ»Ρ Π½Π°Ρ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ: Β· ΠΠ°Π»ΡΠ·Π΅Π²Ρ ΡΡΠ°Π½Π΄Π°ΡΡΠΈ ISO 27001, NIST 800-53, PCI DSS ΡΠ° ΠΌΠ΅ΡΠΎΠ΄ΠΈΠΊΠΈ ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π²Π΅Π± ΡΡΡΠ΅Π½Ρ OWASP TOP 10 Β· ΠΠΎΡΠ²ΡΠ΄ Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ Π°Π½ΡΠΈΠ²ΡΡΡΡΠ½ΠΈΡ ΡΡΡΠ΅Π½Ρ ΡΡΠ²Π½Ρ IPS/IDS/EDR. Β· ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ DLP, SIEM (splunk, graylog,...ΠΠ»Ρ Π½Π°Ρ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ:
Β· ΠΠ°Π»ΡΠ·Π΅Π²Ρ ΡΡΠ°Π½Π΄Π°ΡΡΠΈ ISO 27001, NIST 800-53, PCI DSS ΡΠ° ΠΌΠ΅ΡΠΎΠ΄ΠΈΠΊΠΈ ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π²Π΅Π± ΡΡΡΠ΅Π½Ρ OWASP TOP 10
Β· ΠΠΎΡΠ²ΡΠ΄ Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ Π°Π½ΡΠΈΠ²ΡΡΡΡΠ½ΠΈΡ ΡΡΡΠ΅Π½Ρ ΡΡΠ²Π½Ρ IPS/IDS/EDR.
Β· ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ DLP, SIEM (splunk, graylog, logstash etc)
Β· ΠΠ½Π°Π½Π½Ρ NGFW.
Β· ΠΠ½Π°Π½Π½Ρ ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ²
Β· ΠΠ°ΠΏΠΈΡΠ°Π½Π½Ρ ΠΏΡΠΎΡΡΠΈΡ SQL Π·Π°ΠΏΠΈΡΡΠ² Π΄Π»Ρ ΡΠΎΠ±ΠΎΡΠΈ Π· Π΄Π°Π½ΠΈΠΌΠΈ
Β· ΠΠ΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΠΠ‘ WS2012R2,2016,2019,2022 ΡΠ° linux (kali/debian/centos)
Β· ΠΠ°ΠΏΠΈΡΠ°Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΠΏΡΠΎΡΠ΅Π΄ΡΡ ΡΠ° ΡΠ½ΡΡΡΡΠΊΡΡΠΉ
ΠΠ°Π²Π΄Π°Π½Π½Ρ, ΡΠΊΡ ΠΏΠΎΡΡΡΠ±Π½ΠΎ Π²ΠΈΡΡΡΡΠ²Π°ΡΠΈ:
Β· Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Β· ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ Π°ΡΠ΄ΠΈΡΡΠ² ΡΠ° ΡΡΠΏΡΠΎΠ²ΡΠ΄ Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ
Β· Π£ΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΠΌΠΈ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Β· ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΡΠΈΡΡΠ΅ΠΌ ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½ΡΡ ΠΠ
Β· ΠΠ΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² ΠΠ (SIEM, NGFW, DLP, AV) ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π½ΠΈΠ²ΠΈΡ
Β· Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ ΡΠ° ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½Ρ Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½ΠΈΡ Π΄Π»Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΠ³ΠΎ ΡΡΠ²Π½Ρ ΠΠ
Β· ΠΡΠ΄ΠΈΡ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΡ
Β· ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²ΡΠ°Π½Ρ, ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΠΌΠ°ΡΠ΅ΡΡΠ°Π»ΡΠ², ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΡΠ²Π½Ρ Π·Π½Π°Π½Ρ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ
Π Π½Π°ΠΌΠΈ ΡΡΠ°Π±ΡΠ»ΡΠ½ΠΎ ΡΠ° Π½Π°Π΄ΡΠΉΠ½ΠΎ, ΡΠΎΠΌΡ ΡΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
Β· 100% Π²ΡΠ΄Π΄Π°Π»Π΅Π½Ρ ΡΠΎΠ±ΠΎΡΡ, Π·Π° ΡΠΌΠΎΠ²ΠΈ ΠΏΠΎΠ²Π½ΠΎΠ³ΠΎ ΡΠΎΠ±ΠΎΡΠΎΠ³ΠΎ ΡΠ°ΡΡ
Β· ΠΠΎΠ²Π½Ρ ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ Π·Π³ΡΠ΄Π½ΠΎ Π· ΠΠΠΏΠ Π£ΠΊΡΠ°ΡΠ½ΠΈ
Β· ΠΡΠ΄ΠΏΡΡΡΠΊΠ° β 26 ΠΊ.Π΄
Β· ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Π°, ΡΡΠΏΡΡΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ², ΡΠΊΡ Π·Π°Π²ΠΆΠ΄ΠΈ Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΡΡΡ Π½ΠΎΠ²Π°ΡΠΊΠΎΠ²Ρ Ρ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ
Β· ΠΠ°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ
More -
Β· 32 views Β· 1 application Β· 8d
Chief Information Security Officer
Ukraine Β· Product Β· 3 years of experienceΠΡΠΈΠ²ΡΡ! ΠΠΈβ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ Π²ΠΆΠ΅ ΠΏΠΎΠ½Π°Π΄ 20 ΡΠΎΠΊΡΠ² ΠΏΡΠ°ΡΡΡ Ρ ΡΡΠ΅ΡΡ ΡΠΎΠ·Π΄ΡΡΠ±Π½ΠΈΡ ΠΏΡΠΎΠ΄Π°ΠΆΡΠ², Π·Π°ΠΊΡΠΏΡΠ²Π»Ρ ΡΠ° Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²Π° ΠΎΠ΄ΡΠ³Ρ ΡΠ° Π°ΠΊΡΠ΅ΡΡΠ°ΡΡΠ² ΡΡΠΊΠ°Ρ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΎΠ³ΠΎ Β«CISOΒ» ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²'ΡΠ·ΠΊΠΈ: Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. ΠΠΎΠ±ΡΠ΄ΠΎΠ²Π° ΡΠ°...ΠΡΠΈΠ²ΡΡ!
ΠΠΈβ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ Π²ΠΆΠ΅ ΠΏΠΎΠ½Π°Π΄ 20 ΡΠΎΠΊΡΠ² ΠΏΡΠ°ΡΡΡ Ρ ΡΡΠ΅ΡΡ ΡΠΎΠ·Π΄ΡΡΠ±Π½ΠΈΡ ΠΏΡΠΎΠ΄Π°ΠΆΡΠ², Π·Π°ΠΊΡΠΏΡΠ²Π»Ρ ΡΠ° Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²Π° ΠΎΠ΄ΡΠ³Ρ ΡΠ° Π°ΠΊΡΠ΅ΡΡΠ°ΡΡΠ² ΡΡΠΊΠ°Ρ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΎΠ³ΠΎ Β«CISOΒ»
ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²'ΡΠ·ΠΊΠΈ:- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΠ±ΡΠ΄ΠΎΠ²Π° ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ InfoSec.
- ΠΡΡΠ½ΠΊΠ° ΠΊΡΠ±Π΅ΡΡΠΈΠ·ΠΈΠΊΡΠ² Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ.
- ΠΠ°Ρ ΠΈΡΡ e-commerce ΠΏΠ»Π°ΡΡΠΎΡΠΌ, ΠΏΠ»Π°ΡΡΠΆΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, CRM, ERP, Π»ΠΎΠ³ΡΡΡΠΈΡΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ.
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°ΡΠ΄ΠΈΡΡΠ², vulnerability assessment, penetration testing.
- ΠΠ·Π°ΡΠΌΠΎΠ΄ΡΡ Π· ΡΠΎΠΏΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½ΡΠΎΠΌ, ΠΠ’, digital, ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½ΠΈΠΌΠΈ ΡΠ° ΡΡΠ½Π°Π½ΡΠΎΠ²ΠΈΠΌΠΈ ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌΠΈ.
- ΠΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΠΏΠ»Π°Π½ΡΠ² ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ° disaster recovery.
ΠΠΈΠΌΠΎΠ³ΠΈ: - ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π½Π° ΠΊΠ΅ΡΡΠ²Π½ΠΈΡ ΠΏΠΎΠ·ΠΈΡΡΡΡ Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ 3+ ΡΠΎΠΊΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ Ρ ΡΠΈΡΠ΅ΠΉΠ»Ρ, e-commerce, ΠΎΠΌΠ½ΡΠΊΠ°Π½Π°Π»ΡΠ½ΠΈΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡΡ β Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ.
- ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ e-commerce, ΠΌΠΎΠ±ΡΠ»ΡΠ½ΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², POS-ΡΠΈΡΡΠ΅ΠΌ.
- ΠΠ½Π°Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ISO 27001, PCI DSS, GDPR, NIST.
- ΠΠ°Π²ΠΈΡΠΊΠΈ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ SOC, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ IAM, EDR, DLP.
- Π‘ΠΈΠ»ΡΠ½Ρ ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½Ρ ΡΠ° Π»ΡΠ΄Π΅ΡΡΡΠΊΡ ΡΠΊΠΎΡΡΡ, Π΄ΠΎΡΠ²ΡΠ΄ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· Π‘-level.
- Π‘Π΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ CISSP, CISM, CISA β Π±ΡΠ΄ΡΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ..
ΠΠΈ ΠΏΠΎΠ΄Π±Π°ΡΠΌΠΎ ΠΏΡΠΎ: - Π’Π²ΡΠΉ Π΄ΠΎΡ ΡΠ΄. ΠΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½Π° Π·Π°ΡΠΎΠ±ΡΡΠ½Π° ΠΏΠ»Π°ΡΠ° ΡΠ° ΡΡΠ°Π±ΡΠ»ΡΠ½Ρ Π²ΠΈΠΏΠ»Π°ΡΠΈ.
- Π’Π²ΠΎΡ Π²ΠΏΠ΅Π²Π½Π΅Π½ΡΡΡΡ. ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ. ΠΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ ΡΠ° Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ (24 ΠΊΠ°Π»Π΅Π½Π΄Π°ΡΠ½Ρ Π΄Π½Ρ Π½Π° ΡΡΠΊ).
- Π’Π²ΡΠΉ Π½Π°ΡΡΡΡΠΉ. ΠΡΡΠΆΠ½Ρ, ΠΊΡΡΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²ΠΈ, ΠΏΠΎΡ ΠΎΠ΄ΠΈ Π² ΠΊΡΠ½ΠΎ, ΠΏβΡΡΠ½ΠΈΡΠ½Ρ ΠΏΠΎΡΠΈΠ΄Π΅Π½ΡΠΊΠΈ Π· Π½Π°ΡΡΠΎΠ»ΠΊΠ°ΠΌΠΈ;)
- Π’Π²ΡΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ. ΠΡΠ΄Π²ΡΠ΄ΡΠ²Π°Π½Π½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΡΠ², ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΡΠΉ, ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π·ΠΎΠ²Π½ΡΡΠ½ΡΠΎΠ³ΠΎ Π½Π°Π²ΡΠ°Π½Π½Ρ.
- Π’Π²ΡΠΉ ΠΊΠΎΠΌΡΠΎΡΡ. ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΊΡΠ»ΡΡΡΡΠ°, Π²Π·Π°ΡΠΌΠΎΠΏΠΎΠ²Π°Π³Π° ΡΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ°, Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ Π»Π΅Π³ΠΊΠΎ Π°Π΄Π°ΠΏΡΡΠ²Π°ΡΠΈΡΡ Π² ΠΊΠΎΠ»Π΅ΠΊΡΠΈΠ²Ρ Ρ ΡΠ°Π·ΠΎΠΌ Π΄ΠΎΠ»Π°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ;
- Π’Π²ΠΎΡ Π·Π΄ΠΎΡΠΎΠ²βΡ. Π‘ΠΏΠΎΡΡΠΈΠ²Π½Π΅ ΠΆΠΈΡΡΡ β ΡΡΡΠ±ΠΎΠ», Π²ΠΎΠ»Π΅ΠΉΠ±ΠΎΠ», ΠΉΠΎΠ³Π°, ΡΡΠ°ΡΡΡ Ρ ΠΌΠ°ΡΠ°ΡΠΎΠ½Π°Ρ .
Π―ΠΊΡΠΎ ΡΠ΅ Π²ΡΠ΅ ΠΏΡΠΎ ΡΠ΅Π±Π΅ β Π½Π°Π΄ΡΠΈΠ»Π°ΠΉ ΡΠ²ΠΎΡ ΡΠ΅Π·ΡΠΌΠ΅! Π’Π° ΡΡΠ°Π²Π°ΠΉ ΡΠ°ΡΡΠΈΠ½ΠΎΡ Π½Π°ΡΠΎΡ Π΄ΡΡΠΆΠ½ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ.
-
Β· 30 views Β· 2 applications Β· 27d
Network Security Engineer
Office Work Β· Ukraine (Kyiv) Β· Product Β· 2 years of experience Β· Pre-Intermediate Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠΈΠΌΠΎΠ³ΠΈ:
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°ΡΠΎΠ±ΡΠ² ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΠΏΠΎΠ΄ΡΠΉ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Ρ ΡΠΎΠ±ΠΎΡΠΈ Π· Splunk Security;
- ΠΠ½Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (NIST, ISO 27001, PCI DSS, PA DSS, CIS Controls v8, CSA Cloud Controls, SOC2, OWASP);
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ, SOC;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· IDS/IPS;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Π·Π°ΡΠΎΠ±ΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΡΠ½ΡΠ΅Π²ΠΈΡ ΡΠΎΡΠΎΠΊ (AV, EDR);
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΠΠ, ΡΠ°ΠΊΠΈΡ ΡΠΊ - IPSec, VPN. TLS, SSL, HTTPS, SSH, PKI;
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΠΈΠΏΡΠ² ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° Π·Π°ΡΠΎΠ±ΡΠ² ΡΡ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, Π»ΠΎΠΊΠ°Π»ΡΠ·Π°ΡΡΡ ΡΠ° ΠΏΡΠΎΡΠΈΠ΄ΡΡ.
ΠΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- Π Π΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- Π ΠΎΠ±ΠΎΡΠ° Π· ΡΡΠ·Π½ΠΈΠΌΠΈ Π΄ΠΆΠ΅ΡΠ΅Π»Π°ΠΌΠΈ ΠΏΠΎΠ΄ΡΠΉ, Π½Π°ΠΏΠΈΡΠ°Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΡΠΎΠ΄ΠΎ Π·Π±ΠΎΡΡ ΡΠ° Π½ΠΎΡΠΌΠ°Π»ΡΠ·Π°ΡΡΡ ΠΏΠΎΠ΄ΡΠΉ Ρ SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΠΊΠΎΡΠ΅Π»ΡΡΡΡ Π² SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ°ΡΡΠ΅ΡΡΠ² Π΄Π»Ρ Π½Π΅ΠΏΡΠ΄ΡΡΠΈΠΌΡΠ²Π°Π½ΠΈΡ Π΄ΠΆΠ΅ΡΠ΅Π» ΠΏΠΎΠ΄ΡΠΉ;
- Π ΠΎΠ·ΡΠΎΠ±Π»Π΅Π½Π½Ρ Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° Π² Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΌΡ ΡΡΠ°Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ², ΡΠΊΡ ΡΡΠΎΡΡΡΡΡΡΡ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- 12 sick days ΡΠ° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ;
- ΠΠΈΡ ΡΠ΄Π½ΠΈΠΉ Π² Π΄Π΅Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ;
- Π ΠΎΠ·Π²ΠΈΡΠΎΠΊ ΡΠ° Π½Π°Π²ΡΠ°Π½Π½Ρ Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠΌΡ ΡΠΎΠ·ΡΡΠ·Ρ;
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΉ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ Π΄Π»Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ;
- ΠΠ»Π°Π½ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡ.
- ΠΡΡΡ Π· Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΈΠΌ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΠΎΠΌ ΡΠ° Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ.
-
Β· 44 views Β· 2 applications Β· 28d
Access Management Specialist
Ukraine Β· Product Β· 1 year of experience Β· Pre-Intermediate Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠ΅ΠΎΠ±Ρ ΡΠ΄Π½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° Π½Π°Π²ΠΈΡΠΊΠΈ:
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ², ΡΠΎΠ·ΠΌΠ΅ΠΆΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΡ, ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Π΄ΠΎ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π°Π±ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° IDM\IAM-ΡΠΈΡΡΠ΅ΠΌ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π½Π° Π°Π½Π°Π»ΠΎΠ³ΡΡΠ½ΡΠΉ ΠΏΠΎΠ·ΠΈΡΡΡ Π²ΡΠ΄ 1 ΡΠΎΠΊΡ.
Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π·Π΄ΡΠΉΡΠ½ΡΡΡΡΡΡ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Ρ k8s, GitLab, Π±Π°Π·Π°Ρ Π΄Π°Π½ΠΈΡ , AWS.
ΠΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ Π±ΡΠ΄Π΅:
- ΠΠ°ΡΠ²Π½ΡΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ β Certified Access Management Specialist (CAMS)
ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ°, ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ.
- Π£ΡΠ°ΡΡΡ Π² Π°ΡΠ΄ΠΈΡΡ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ².
ΠΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- ΠΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ
- Π¦ΡΠΊΠ°Π²Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ, ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠ° ΠΊΠ°Ρ'ΡΡΠ½ΠΎΠ³ΠΎ Π·ΡΠΎΡΡΠ°Π½Π½Ρ;
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΡΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ;
- Π‘ΡΡΠ°ΡΠ½ΠΈΠΉ ΠΎΡΡΡ ΡΠ° ΠΊΠΎΠΌΡΠΎΡΡΠ½Π΅ ΡΠΎΠ±ΠΎΡΠ΅ ΠΌΡΡΡΠ΅;
- Π ΡΠ·Π½Ρ ΠΏΠ°ΠΊΠ΅ΡΠΈ ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΠΉ ΡΠ° Π±ΠΎΠ½ΡΡΡΠ² Π·Π°Π»Π΅ΠΆΠ½ΠΎ Π²ΡΠ΄ ΡΡΠΈΠ²Π°Π»ΠΎΡΡΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ, ΡΠ΅ΡΠ΅Π΄ ΡΠΊΠΈΡ : ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ Π΄ΠΎ ΡΡΡΠ½ΠΈΡΡ ΡΠΎΠ±ΠΎΡΠΈ, ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π΄ΠΈΡΡΠ°Π΄ΠΊΠ°.
-
Β· 64 views Β· 4 applications Β· 27d
Information Security Engineer (RozetkaPay)
Full Remote Β· Ukraine Β· Product Β· 3 years of experience Ukrainian Product πΊπ¦RozetkaPay β ΠΏΠ»Π°ΡΡΠΆΠ½ΠΈΠΉ ΡΠ΅ΡΠ²ΡΡ, ΡΠΊΠΈΠΉ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡ Π·ΡΡΡΠ½Ρ, ΡΠ²ΠΈΠ΄ΠΊΡ ΡΠ° Π½Π°Π΄ΡΠΉΠ½Ρ ΠΏΠ»Π°ΡΡΠΆΠ½Ρ ΡΠ΅ΡΠ²ΡΡΠΈ ΡΠΊ Π² ΠΎΠ½Π»Π°ΠΉΠ½Ρ, ΡΠ°ΠΊ Ρ ΠΎΡΠ»Π°ΠΉΠ½Ρ, Π° ΠΏΡΠΎΡΠ΅Ρ ΠΊΡΠΏΡΠ²Π»Ρ ΡΠΎΠ±ΠΈΡΡ ΠΏΡΠΎΡΡΠΈΠΌ ΡΠ° Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΈΠΌ. RozetkaPay Π²Ρ ΠΎΠ΄ΠΈΡΡ Π΄ΠΎ Π³ΡΡΠΏΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΠΉ EVO-Rozetka. ΠΠ»Π°ΡΡΠΆΠ½ΠΈΠΉ ΡΠ΅ΡΠ²ΡΡ ΡΡΠ²ΠΎΡΠ΅Π½ΠΈΠΉ Π½Π° Π±Π°Π·Ρ...RozetkaPay β ΠΏΠ»Π°ΡΡΠΆΠ½ΠΈΠΉ ΡΠ΅ΡΠ²ΡΡ, ΡΠΊΠΈΠΉ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡ Π·ΡΡΡΠ½Ρ, ΡΠ²ΠΈΠ΄ΠΊΡ ΡΠ° Π½Π°Π΄ΡΠΉΠ½Ρ ΠΏΠ»Π°ΡΡΠΆΠ½Ρ ΡΠ΅ΡΠ²ΡΡΠΈ ΡΠΊ Π² ΠΎΠ½Π»Π°ΠΉΠ½Ρ, ΡΠ°ΠΊ Ρ ΠΎΡΠ»Π°ΠΉΠ½Ρ, Π° ΠΏΡΠΎΡΠ΅Ρ ΠΊΡΠΏΡΠ²Π»Ρ ΡΠΎΠ±ΠΈΡΡ ΠΏΡΠΎΡΡΠΈΠΌ ΡΠ° Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΈΠΌ.
RozetkaPay Π²Ρ ΠΎΠ΄ΠΈΡΡ Π΄ΠΎ Π³ΡΡΠΏΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΠΉ EVO-Rozetka. ΠΠ»Π°ΡΡΠΆΠ½ΠΈΠΉ ΡΠ΅ΡΠ²ΡΡ ΡΡΠ²ΠΎΡΠ΅Π½ΠΈΠΉ Π½Π° Π±Π°Π·Ρ Π½Π°ΠΉΠ²ΡΠ΄ΠΎΠΌΡΡΠΈΡ ΠΌΠ°ΡΠΊΠ΅ΡΠΏΠ»Π΅ΠΉΡΡΠ² ΠΊΡΠ°ΡΠ½ΠΈ, ΡΠΊΠΈΠΌΠΈ ΠΊΠΎΡΠΈΡΡΡΡΡΡΡΡ ΠΌΡΠ»ΡΠΉΠΎΠ½ΠΈ ΡΠΊΡΠ°ΡΠ½ΡΡΠ². ΠΠ°ΡΡ ΡΠ΅ΡΠ²ΡΡΠΈ Π²ΠΆΠ΅ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΡ Rozetka, Prom, Vchasno, Bigl, Shafa, Volonter by Prom, Vodafone, Robota.ua, Yakaboo ΡΠ° ΡΠ½ΡΡ.
ΠΠΎΠΌΠ°Π½Π΄Π° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠΊΠ»Π°Π΄Π°ΡΡΡΡΡ ΡΠ· Π»ΡΠ΄Π° ΡΠ° ΡΠ΅ 3 ΡΠ°Ρ ΡΠ²ΡΡΠ².
ΠΠ°Ρ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ:
- Π· Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠΎΠ±ΠΎΡΠΈ Π² ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ (ΠΠ’) Π°Π±ΠΎ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ΠΠ) Π±ΡΠ»ΡΡΠ΅ 3-Ρ ΡΠΎΠΊΡΠ²;
- Π·Ρ Π·Π½Π°Π½Π½ΡΠΌ ΠΊΠ»ΡΡΠΎΠ²ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΡ ΡΠΈΠ·ΠΈΠΊΡΠ² ΡΠ° ΠΎΠ±Π»Π°ΡΡΠ΅ΠΉ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΠΠ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Π΄ΠΎ ΡΠΈΡΡΠ΅ΠΌ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ½ΠΈΠΌΠΈ Π·ΠΌΡΠ½Π°ΠΌΠΈ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΡΠ³ΡΡΠ°ΡΡΡΠΌΠΈ
- Π· Π²ΡΠ΄ΠΌΡΠ½Π½ΠΈΠΌΠΈ ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΠΈΠ²Π½ΠΈΠΌΠΈ Π½Π°Π²ΠΈΡΠΊΠ°ΠΌΠΈ
- Π·Ρ Π·Π½Π°Π½Π½ΡΠΌ ΠΏΡΠ΄Ρ ΠΎΠ΄ΡΠ² Π΄ΠΎ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²Π΅Π±-Π΄ΠΎΠ΄Π°ΡΠΊΡΠ² Ρ ΡΠΏΠΎΡΠΎΠ±ΡΠ² ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ Π·Π°Π³ΡΠΎΠ·
- Π·Ρ Π·Π½Π°Π½Π½ΡΠΌ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠΎΠ³ΠΎ Π·Π°ΠΊΠΎΠ½ΠΎΠ΄Π°Π²ΡΡΠ²Π° Ρ Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΈΡ Π°ΠΊΡΡΠ² Π² ΡΡΠ΅ΡΡ ΠΠ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ , Π° ΡΠ°ΠΊΠΎΠΆ ΡΠΎΠ·ΡΠΌΡΠ½Π½ΡΠΌ ΠΊΠ»ΡΡΠΎΠ²ΠΈΡ ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½Ρ ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½ΠΈΡ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Ρ ΠΏΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ, Π½Π°ΠΏΡΠΈΠΊΠ»Π°Π΄, ISO27001, PCI DSS, SOC2, NIST, COBIT, GDPR.
Π―ΠΊ ΠΎΠΊΡΠ΅ΠΌΠΈΠΉ ΠΏΠ»ΡΡ, Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ ΠΌΠ°ΡΠΈ ΡΠΎΡΡ Π· ΡΡΠΎΠ³ΠΎ Π΄ΠΎΡΠ²ΡΠ΄Ρ Π°Π±ΠΎ Π·Π½Π°Π½Ρ:
- Π΄ΠΎΡΠ²ΡΠ΄ Π°ΡΠ΄ΠΈΡΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΠΏΠ»Π°ΡΡΠΎΡΠΌ Ρ Π²Π΅Π»ΠΈΠΊΠΈΡ ΡΠ° ΡΠΊΠ»Π°Π΄Π½ΠΈΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ°Ρ , Π² Ρ.Ρ. ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, Π±Π°Π· Π΄Π°Π½ΠΈΡ , ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ ΠΏΡΠΈΡΡΡΠΎΡΠ² Ρ Π²ΡΡΡΡΠ°Π»ΡΠ½ΠΈΡ ΠΎΠ±ΡΠΈΡΠ»ΡΠ²Π°Π»ΡΠ½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ
- Π½Π°ΡΠ²Π½ΡΡΡΡ ΡΠ΅Ρ Π½ΡΡΠ½ΠΈΡ Π·Π½Π°Π½Ρ Π² ΠΎΠ±Π»Π°ΡΡΡΡ : Π±Π΅Π·ΠΏΠ΅ΠΊΠ° Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ (AWS, GCP), Π±Π΅Π·ΠΏΠ΅ΠΊΠ° ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΠ½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ ΡΠ° Π²ΡΡΡΡΠ°Π»ΡΠ·Π°ΡΡΡ (Kubernetes), Π±Π΅Π·ΠΏΠ΅ΠΊΠ° ΡΠΈΡΡΠ΅ΠΌ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π±Π°Π·Π°ΠΌΠΈ Π΄Π°Π½ΠΈΡ (PostgreSQL), Π±Π΅Π·ΠΏΠ΅ΠΊΠ° ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ ΡΠ΅ΡΠ²Π΅ΡΡΠ² ΡΠ° ΡΠΎΠ±ΠΎΡΠΈΡ ΡΡΠ°Π½ΡΡΠΉ
- Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΠΏΠΎΠ΄ΡΠΉ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM)
- Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π·Π°ΠΏΠΎΠ±ΡΠ³Π°Π½Π½Ρ Π²ΠΈΡΠΎΠΊΡ Π΄Π°Π½ΠΈΡ (DLP)
- Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠΈΠ΄ΡΡ ΡΠΏΡΠΎΠ±Π°ΠΌ ΠΏΡΠΎΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ (IPS/IDS)
ΠΠ°ΡΠ²Π½ΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠ² ΡΠ°ΠΊΠΎΠΆ Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ, Π°Π»Π΅ Π½Π΅ Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΠΎΡ: CISSP, CompTIA Security+, GSEC, CCSP, SSCP, CASP+, CYSA+ Π°Π±ΠΎ ΡΠ½.
ΠΠ°Π΄Π°ΡΡ Π² ΠΏΡΠΎΠ΅ΠΊΡΡ:
ΠΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΡΠ° ΠΏΡΠΎΡΠ΅Π΄ΡΡ ΠΠ Π·Π³ΡΠ΄Π½ΠΎ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π° ΡΠ°ΠΌΠ΅:
- ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ ΡΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΡΠΎΠ±ΠΎΡΠΈ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² ΠΠ (SIEM, DLP, IPS/IDS)
- ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ ΠΏΠΎΠ΄ΡΠΉ ΠΠ Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ
- ΠΏΠ΅ΡΠ΅Π²ΡΡΠΊΠ° Π½Π°Π»Π°ΡΡΡΠ²Π°Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ Ρ Π°Π½Π°Π»ΡΠ· ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΡ
- ΡΡΠ°ΡΡΡ Π² ΠΏΡΠΎΠ΅ΠΊΡΠ°Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ΅Π½Ρ Π΄Π»Ρ ΠΠ
- ΡΡΠ°ΡΡΡ Ρ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²ΡΠ°Π½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ² ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ ΠΏΡΠΎΠ΅ΠΊΡΡ ΠΏΠΎ ΠΏΠΈΡΠ°Π½Π½ΡΡ ΠΠ
ΠΡΠ°ΠΏΠΈ ΡΠΏΡΠ²Π±Π΅ΡΡΠ΄:
- ΠΠ½ΡΠ΅ΡΠ²ΚΌΡ ΡΠ· ΡΠ΅ΠΊΡΡΡΠ΅ΡΠΎΠΌ ΡΠ° Π»ΡΠ΄Π΅ΡΠΎΠΌ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ ΠΠ
- Π€ΡΠ½Π°Π»ΡΠ½Π΅ ΡΠ½ΡΠ΅ΡΠ²ΚΌΡ
ΠΡΠΎ ΡΠΎΠ±ΠΎΡΡ Π² EVO:
Π‘ΠΎΡΡΠ°Π»ΡΠ½ΠΈΠΉ ΠΏΠ°ΠΊΠ΅Ρ β ΠΎΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ, 24 Π΄Π½Ρ ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½ΠΎΡ Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ Π½Π° ΡΡΠΊ Ρ Π½Π΅ΠΎΠ±ΠΌΠ΅ΠΆΠ΅Π½Π° ΠΊΡΠ»ΡΠΊΡΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ , ΡΠΎΠ± Π²ΠΈ ΠΌΠΎΠ³Π»ΠΈ Π²ΡΠ΄ΠΏΠΎΡΠΈΠ²Π°ΡΠΈ ΡΠ° Π΄Π±Π°ΡΠΈ ΠΏΡΠΎ ΡΠ²ΠΎΡ Π·Π΄ΠΎΡΠΎΠ²βΡ.
Π’ΡΡΠ±ΠΎΡΠ° ΠΏΡΠΎ Π·Π΄ΠΎΡΠΎΠ²βΡ β ΠΌΠΈ ΠΏΠΎΠΊΡΠΈΠ²Π°ΡΠΌΠΎ ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³Π°, Π°Π΄ΠΆΠ΅ ΠΏΠ΅ΡΠ΅ΠΊΠΎΠ½Π°Π½Ρ, ΡΠΎ ΠΏΡΠΊΠ»ΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎ ΠΌΠ΅Π½ΡΠ°Π»ΡΠ½Π΅ Π·Π΄ΠΎΡΠΎΠ²βΡ Ρ ΡΠ°ΠΊ ΡΠ°ΠΌΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΈΠΌ, ΡΠΊ Ρ ΠΏΡΠΎ ΡΡΠ·ΠΈΡΠ½Π΅.
ΠΠ½ΡΡΠΊΠΈΠΉ ΡΠΎΡΠΌΠ°Ρ ΡΠΎΠ±ΠΎΡΠΈ β Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ Π°Π±ΠΎ Π² ΠΎΡΡΡΡ. ΠΠΈ ΠΌΠΎΠΆΠ΅ΡΠ΅ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π΄ΠΈΡΡΠ°Π½ΡΡΠΉΠ½ΠΎ Π°Π±ΠΎ Π²ΡΠ΄Π²ΡΠ΄ΡΠ²Π°ΡΠΈ Π½Π°Ρ Π·Π°ΡΠΈΡΠ½ΠΈΠΉ ΠΎΡΡΡ Π² ΠΠΈΡΠ²Ρ, ΡΠΊΠΈΠΉ ΠΏΠΎΠ²Π½ΡΡΡΡ Π΅Π½Π΅ΡΠ³ΠΎΠ½Π΅Π·Π°Π»Π΅ΠΆΠ½ΠΈΠΉ ΡΠ° ΠΎΡΠ½Π°ΡΠ΅Π½ΠΈΠΉ ΡΡΡΠΌ Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½ΠΈΠΌ.
ΠΠΎΠ»ΠΎΠ½ΡΠ΅ΡΡΡΠΊΠ° ΡΠΏΡΠ»ΡΠ½ΠΎΡΠ° β ΠΌΠΈ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΎ ΠΏΡΠΎΠ²ΠΎΠ΄ΠΈΠΌΠΎ Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½Ρ Π°ΡΠΊΡΡΠΎΠ½ΠΈ, Π·Π±ΠΈΡΠ°ΡΠΌΠΎ Π³ΡΠΎΡΡ Π½Π° Π΄ΡΠΎΠ½ΠΈ-ΡΠΎΠ·Π²ΡΠ΄Π½ΠΈΠΊΠΈ ΡΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΡΡΠΌΠΎ Π²ΠΎΠ»ΠΎΠ½ΡΠ΅ΡΡΡΠΊΡ ΡΠ½ΡΡΡΠ°ΡΠΈΠ²ΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ².
ΠΠΈ Π½Π°Π΄Π°ΡΠΌΠΎ ΡΡΠ²Π½Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π΄Π»Ρ Π²ΡΡΡ β ΡΠΎΠΌΡ Π½Π΅ Π΄ΠΎΠΏΡΡΠΊΠ°ΡΠΌΠΎ Π΄ΠΈΡΠΊΡΠΈΠΌΡΠ½Π°ΡΡΡ Π·Π° Π±ΡΠ΄Ρ-ΡΠΊΠΈΠΌΠΈ ΠΎΠ·Π½Π°ΠΊΠ°ΠΌΠΈ. Π’Π°ΠΊΠΎΠΆ ΠΌΠΈ Π²ΡΠ΄ΠΊΡΠΈΡΡ Π΄ΠΎ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· Π²Π΅ΡΠ΅ΡΠ°Π½Π°ΠΌΠΈ/Π²Π΅ΡΠ΅ΡΠ°Π½ΠΊΠ°ΠΌΠΈ ΡΠ° Π³ΠΎΡΠΎΠ²Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠ°ΡΠΈ ΡΡ Π½Π° ΡΠ»ΡΡ Ρ Π΄ΠΎ Π½ΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ Π΄ΠΎΡΡΠ³Π½Π΅Π½Ρ.
More
-
Β· 9 views Β· 0 applications Β· 1d
ΠΠ΅ΡΠΎΠ΄ΠΎΠ»ΠΎΠ³ ΠΠ
Ukraine Β· 2 years of experience Β· IntermediateMODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ ...MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΡΡΠΊΠ°ΡΠΌΠΎ ΠΠ΅ΡΠΎΠ΄ΠΎΠ»ΠΎΠ³Π° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠ°Π²ΠΈΡΠΊΠΈ:- ΠΠΈΡΠ° ΠΎΡΠ²ΡΡΡ Π·Π° Π½Π°ΠΏΡΡΠΌΠΊΠΎΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Π° Π±Π΅Π·ΠΏΠ΅ΠΊΠ°/ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠ°, ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ, ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΡ;
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ/ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΎΠ½ΠΎΠ²Π»Π΅Π½Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ² ΡΠΎ ΡΠ΅Π³Π»Π°ΠΌΠ΅Π½ΡΡΡΡΡ ΠΎΡΠ½ΠΎΠ²Π½Ρ ΠΏΡΠΎΡΠ΅ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½Ρ, ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π·Π° Π½Π°ΠΏΡΡΠΌΠΊΠΎΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡΡ ;
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΠΈΠΏΡΠ² ΡΠΈΡΡΠ΅ΠΌ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΠΠ ΡΠ° ΡΡΠ²ΡΠ΄ΠΎΠΌΠ»Π΅Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΡ ΡΠΎΠ±ΠΎΡΠΈ;
- ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ², ΠΌΠ΅Ρ Π°Π½ΡΠ·ΠΌΡΠ², ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ, ΡΠΎ Π·Π°ΡΡΠΎΡΠΎΠ²ΡΡΡΡΡΡ Π΄Π»Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ /ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ/ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ;
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΆΠΈΡΡΡΠ²ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π±ΡΠ·Π½Π΅Ρ-ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ, Π° ΡΠ°ΠΊΠΎΠΆ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π·ΠΌΡΠ½Π°ΠΌΠΈ Π² ΡΠ°ΠΌΠΊΠ°Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ΅ΡΠ²Π½ΠΎΠ³ΠΎ ΠΏΠΎΠ»ΡΠΏΡΠ΅Π½Π½Ρ;
- ΠΠ΄Π°ΡΠ½ΡΡΡΡ ΡΠ°ΠΌΠΎΡΡΡΠΉΠ½ΠΎ Π²ΠΈΠΊΠΎΠ½ΡΠ²Π°ΡΠΈ ΠΏΠΎΡΡΠ°Π²Π»Π΅Π½Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ, Π° ΡΠ°ΠΊΠΎΠΆ Π±Π°ΠΆΠ°Π½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ;
- ΠΠ°Π·ΠΎΠ²Ρ Π½Π°Π²ΠΈΡΠΊΠΈ Π²Π΅Π΄Π΅Π½Π½Ρ ΠΏΠ΅ΡΠ΅Π³ΠΎΠ²ΠΎΡΡΠ² Ρ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΏΡΠ΅Π·Π΅Π½ΡΠ°ΡΡΠΉ;
- ΠΠ½Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ Π·Π°ΠΊΠΎΠ½ΠΎΠ΄Π°Π²ΡΡΠ²Π° Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ(Π½Π°ΠΏΡ. ISO 27001, 27032, 27005, 270Ρ Ρ , GDPR, NIST, COBIT, CIS Controls v8, CSA Cloud Controls ΡΠΎΡΠΎ) Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ.
ΠΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ- Π ΠΎΠ·ΡΠΎΠ±Π»Π΅Π½Π½Ρ Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° Π² Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΌΡ ΡΡΠ°Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ² ΠΠΎΠΌΠΏΠ°Π½ΡΡ Π· ΠΏΠΈΡΠ°Π½Ρ ΠΠ (ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΡΠ΅Π³Π»Π°ΠΌΠ΅Π½ΡΡΠ², ΠΏΡΠΎΡΠ΅Π΄ΡΡ ΡΠΎΡΠΎ) ΡΠ° ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ ΡΡ ΡΠ·Π³ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° Π·Π°ΡΠ²Π΅ΡΠ΄ΠΆΠ΅Π½Π½Ρ;
- Π€ΠΎΡΠΌΡΠ²Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΈΠ·Π°ΠΉΠ½ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ² Π΄Π»Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΠΠ
- ΠΠ½Π²Π΅Π½ΡΠ°ΡΠΈΠ·Π°ΡΡΡ ΡΠ° ΠΊΠ»Π°ΡΠΈΡΡΠΊΠ°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ² ΠΠΎΠΌΠΏΠ°Π½ΡΡ;
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΡΠ° ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π·Π°Ρ ΠΎΠ΄ΡΠ², ΡΠΏΡΡΠΌΠΎΠ²Π°Π½ΠΈΡ Π½Π° Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΎΠ³ΠΎ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ;
- ΠΠ΅ΡΠ΅Π³Π»ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½ΠΈΡ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° Π·Π°Ρ ΠΎΠ΄ΡΠ² ΡΠΎΠ΄ΠΎ ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΡΡ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ;
- ΠΠΎΠ½ΡΡΠ»ΡΡΡΠ²Π°Π½Π½Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π· ΠΏΠΈΡΠ°Π½Ρ ΠΠ (Π² ΡΠ°ΠΌΠΊΠ°Ρ ΡΡΠ½ΠΊΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΡΠ²);
- ΠΠ΅ΡΠΎΠ΄ΠΎΠ»ΠΎΠ³ΡΡΠ½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΡΠΎΠ±ΠΎΡΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»Ρ ΠΠ ΠΠΎΠΌΠΏΠ°Π½ΡΡ;
- Π£Π·Π°Π³Π°Π»ΡΠ½Π΅Π½Π½Ρ Π·Π²ΡΡΠ½ΠΎΡΡΡ ΡΠ° Π·Π±ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΡΠΎΠ΄ΠΎ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΠΠ Π΄Π»Ρ ΠΏΠΎΠ΄Π°Π½Π½Ρ ΠΊΠ΅ΡΡΠ²Π½ΠΈΡΡΠ²Ρ
- ΡΡΠ°ΡΡΡ Ρ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΡΠ° Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ Π°ΡΠ΄ΠΈΡΡΠ² Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΠΌΠ°ΡΠ΅ΡΡΠ°Π»ΡΠ² Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π΄Π»Ρ ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ Π² ΠΏΠΈΡΠ°Π½Π½ΡΡ ΠΠ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ.
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ.
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ².
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City.
- ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ).
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More -
Β· 29 views Β· 3 applications Β· 7d
Information Security Engineer
Ukraine Β· Product Β· 2 years of experienceΠΡΠΈΠ²ΡΡ! ΠΠΈ β Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½Π° ΠΌΠ΅ΡΠ΅ΠΆΠ° ΡΡΠΏΠ΅ΡΠΌΠ°ΡΠΊΠ΅ΡΡΠ² VARUS, ΡΠΎ Π½Π°Π»ΡΡΡΡ ΠΏΠΎΠ½Π°Π΄ 130 ΠΌΠ°Π³Π°Π·ΠΈΠ½ΡΠ² Ρ 29 ΠΌΡΡΡΠ°Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π²Ρ ΠΎΠ΄ΠΈΡΡ Π΄ΠΎ Π’ΠΠ-10 ΡΠΎΠ·Π΄ΡΡΠ±Π½ΠΈΡ ΠΌΠ΅ΡΠ΅ΠΆ ΠΊΡΠ°ΡΠ½ΠΈ Π·Π° ΠΎΠ±ΡΡΠ³ΠΎΠΌ ΡΠΎΠ²Π°ΡΠΎΠΎΠ±ΡΠ³Ρ. Π¨ΡΠΊΠ°ΡΠΌΠΎ Π€Π°Ρ ΡΠ²Π΅ΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ: ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Ρ...ΠΡΠΈΠ²ΡΡ!
ΠΠΈ β Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½Π° ΠΌΠ΅ΡΠ΅ΠΆΠ° ΡΡΠΏΠ΅ΡΠΌΠ°ΡΠΊΠ΅ΡΡΠ² VARUS, ΡΠΎ Π½Π°Π»ΡΡΡΡ ΠΏΠΎΠ½Π°Π΄ 130 ΠΌΠ°Π³Π°Π·ΠΈΠ½ΡΠ² Ρ 29 ΠΌΡΡΡΠ°Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π²Ρ ΠΎΠ΄ΠΈΡΡ Π΄ΠΎ Π’ΠΠ-10 ΡΠΎΠ·Π΄ΡΡΠ±Π½ΠΈΡ ΠΌΠ΅ΡΠ΅ΠΆ ΠΊΡΠ°ΡΠ½ΠΈ Π·Π° ΠΎΠ±ΡΡΠ³ΠΎΠΌ ΡΠΎΠ²Π°ΡΠΎΠΎΠ±ΡΠ³Ρ.
Π¨ΡΠΊΠ°ΡΠΌΠΎ Π€Π°Ρ ΡΠ²Π΅ΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Ρ Π½ΠΎΠ²ΠΈΡ ΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΎΡΡΠ½ΠΊΠ° ΡΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΠ½ΡΡΠΎΠ»Ρ ΡΠ° Π½Π°Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ ΡΠ΅ΡΠ²Π΅ΡΡΠ² Π°Π½ΡΠΈΠ²ΡΡΡΡΠ½ΠΎΠ³ΠΎ Π·Π°Ρ ΠΈΡΡΡ, Π·Π°Ρ ΠΈΡΡΡ ΡΡΠ°ΡΡΠΊΡ, ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΡΡΡ Π±Π°Π· ΡΠΈΠ³Π½Π°ΡΡΡ Π·Π°Π³ΡΠΎΠ·.
- ΠΠΏΡΠΈΠΌΡΠ·Π°ΡΡΡ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π±ΡΠ°Π½Π΄ΠΌΠ°ΡΠ΅ΡΠ°Ρ Ρ Π°Π½ΡΠΈΠ²ΡΡΡΡΠ½ΠΈΡ ΡΡΡΠ΅Π½Π½ΡΡ , Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² Π· ΠΌΡΠ½ΡΠΌΡΠ·Π°ΡΡΡ ΡΠΈΠ·ΠΈΠΊΡΠ².
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²Π΅Π΄Π΅Π½Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΡΠ½ΡΡΡΡΠΊΡΡΠΉ, ΠΏΡΠ΅Π·Π΅Π½ΡΠ°ΡΡΠΉ, ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ Π½Π°Π²ΡΠ°Π»ΡΠ½ΠΈΡ ΡΠ΅ΡΡΠΉ Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ².
- ΠΠ»Π°Π½ΡΠ²Π°Π½Π½Ρ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΡΠΏΡΠΎΠ²ΡΠ΄ Π½ΠΎΠ²ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΡ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ.
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΎΡ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ², Π°Π½Π°Π»ΡΠ· Π·Π°Π³ΡΠΎΠ· ΡΠ° Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ, ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² ΡΠΎΠ΄ΠΎ ΡΡ ΡΡΡΠ½Π΅Π½Π½Ρ.
- Π£ΡΠ°ΡΡΡ Ρ ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- Π Π΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π°Π½Π°Π»ΡΠ· ΠΏΡΠΈΡΠΈΠ½, ΡΡΡΠ½Π΅Π½Π½Ρ Π½Π°ΡΠ»ΡΠ΄ΠΊΡΠ² ΡΠ° ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π·Π²ΡΡΠ½ΠΎΡΡΡ.
- ΠΠ·Π°ΡΠΌΠΎΠ΄ΡΡ Π· ΡΠ½ΡΠΈΠΌΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»Π°ΠΌΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π΄Π»Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠ΄Ρ ΠΎΠ΄Ρ Π΄ΠΎ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ.
ΠΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΠ°:
- ΠΠΈΡΠ° ΠΎΡΠ²ΡΡΠ° Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π°Π±ΠΎ Π΅ΠΊΠ²ΡΠ²Π°Π»Π΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠΈ.
- ΠΠΎΡΠ²ΡΠ΄ Π°Π½Π°Π»ΡΠ·Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ, ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Ρ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ (ΠΏΠ΅Π½ΡΠ΅ΡΡΡΠ²), ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ.
- ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΡ (SIEM) ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π°Π½Π°Π»ΡΠ·Ρ ΠΆΡΡΠ½Π°Π»ΡΠ² ΠΏΠΎΠ΄ΡΠΉ.
- ΠΠΌΡΠ½Π½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΊΠΎΠΌΡΠ½ΡΠΊΡΠ²Π°ΡΠΈ ΡΠ° ΡΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ Ρ ΠΊΠ΅ΡΡΠ²Π½ΠΈΡΡΠ²ΠΎΠΌ.
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ»ΠΎΠ³ΡΠΉ Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, CIS).
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Π·Π°Ρ ΠΈΡΡΡ, Π·ΠΎΠΊΡΠ΅ΠΌΠ°: ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ Π±ΡΠ°Π½Π΄ΠΌΠ°ΡΠ΅ΡΡΠ², ΡΠΈΡΡΠ΅ΠΌ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ° Π·Π°ΠΏΠΎΠ±ΡΠ³Π°Π½Π½Ρ Π²ΡΠΎΡΠ³Π½Π΅Π½Π½ΡΠΌ (IDS/IPS), Π°Π½ΡΠΈΠ²ΡΡΡΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ½ΠΎΠ³ΠΎ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠΎΡΠΎ.
- ΠΠ°Π²ΠΈΡΠΊΠΈ Ρ ΡΡΠ΅ΡΡ ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ , ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ Π·Π°Π³ΡΠΎΠ· ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ.
- ΠΠΎΡΠ²ΡΠ΄ Π²Π΅Π΄Π΅Π½Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ Π· ΠΏΠΈΡΠ°Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
- ΠΠΎΠΏΠ΅ΡΠ΅Π΄Π½ΡΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π²ΡΠ΄ 2 ΡΠΎΠΊΡΠ² Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ).
- ΠΠ½Π°Π½Π½Ρ ΡΠΈΠ½Π½ΠΎΠ³ΠΎ Π·Π°ΠΊΠΎΠ½ΠΎΠ΄Π°Π²ΡΡΠ²Π° ΡΠ° Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΈΡ Π²ΠΈΠΌΠΎΠ³ Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
β ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² ΡΡΠ°Π±ΡΠ»ΡΠ½ΡΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΠΎ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ.
β ΠΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½Ρ ΠΏΠ»Π°ΡΡ ΡΠ° Π³Π½ΡΡΠΊΡ ΡΠΈΡΡΠ΅ΠΌΡ Π±ΠΎΠ½ΡΡΡΠ².
β ΠΡΡΠΆΠ½Ρ ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ² Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ Π² ΡΠΎΠ·Π²ΠΈΡΠΊΡ.
Π§Π΅ΠΊΠ°ΡΠΌΠΎ Π½Π° ΠΠ°ΡΠ΅ ΡΠ΅Π·ΡΠΌΠ΅ β ΠΏΡΠΈΡΠ΄Π½ΡΠΉΡΠ΅ΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ!
Π―ΠΊΡΠΎ Π²ΠΈ Π±Π°ΠΆΠ°ΡΡΠ΅ Π²ΡΠΈΡΠΈΡΡ Π½ΠΎΠ²ΠΎΠΌΡ ΡΠ° ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΠΈΡΡ ΡΠ°Π·ΠΎΠΌ Π· Π½Π°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΠΌ Π±ΡΠ΅Π½Π΄ΠΎΠΌ, ΡΠΎ ΠΌΠΈ ΡΠ΅ΠΊΠ°ΡΠΌΠΎ Π½Π° Π²Π°ΡΠ΅ ΡΠ΅Π·ΡΠΌΠ΅!
More -
Β· 21 views Β· 2 applications Β· 1d
Π€Π°Ρ ΡΠ²Π΅ΡΡ ΡΠ· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Full Remote Β· Ukraine Β· Product Β· 2 years of experienceΠΡΠ½ΠΎΠ²Π½Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ: Π ΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΈ ΡΠ° ΡΠ΅Π°Π»ΡΠ·ΠΎΠ²ΡΠ²Π°ΡΠΈ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΡΠ° Π·Π°Ρ ΠΎΠ΄ΠΈ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π²ΡΠ΄ Π²Π½ΡΡΡΡΡΠ½ΡΡ Π·Π°Π³ΡΠΎΠ·; ΠΠΈΡΠ²Π»ΡΡΠΈ ΡΠ° Π°Π½Π°Π»ΡΠ·ΡΠ²Π°ΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠΉΠ½Ρ Π²Π½ΡΡΡΡΡΠ½Ρ Π·Π°Π³ΡΠΎΠ·ΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ Π°Π½Π°Π»ΡΠ· ΠΏΠΎΠ²Π΅Π΄ΡΠ½ΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²; ΠΡΠ΄ΡΡΠ΅ΠΆΡΠ²Π°ΡΠΈ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ²Π°ΡΠΈ Π°ΠΊΡΠΈΠ²Π½ΡΡΡΡ...ΠΡΠ½ΠΎΠ²Π½Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ:
- Π ΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΈ ΡΠ° ΡΠ΅Π°Π»ΡΠ·ΠΎΠ²ΡΠ²Π°ΡΠΈ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΡΠ° Π·Π°Ρ ΠΎΠ΄ΠΈ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π²ΡΠ΄ Π²Π½ΡΡΡΡΡΠ½ΡΡ Π·Π°Π³ΡΠΎΠ·;
- ΠΠΈΡΠ²Π»ΡΡΠΈ ΡΠ° Π°Π½Π°Π»ΡΠ·ΡΠ²Π°ΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠΉΠ½Ρ Π²Π½ΡΡΡΡΡΠ½Ρ Π·Π°Π³ΡΠΎΠ·ΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ Π°Π½Π°Π»ΡΠ· ΠΏΠΎΠ²Π΅Π΄ΡΠ½ΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²;
- ΠΡΠ΄ΡΡΠ΅ΠΆΡΠ²Π°ΡΠΈ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ²Π°ΡΠΈ Π°ΠΊΡΠΈΠ²Π½ΡΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ² Π΄Π»Ρ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ Π°Π½ΠΎΠΌΠ°Π»ΡΠΉ ΡΠ° ΠΏΡΠ΄ΠΎΠ·ΡΡΠ»ΠΎΡ Π°ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ;
- Π£ΠΏΡΠ°Π²Π»ΡΡΠΈ ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ° Π·Π°ΠΏΠΎΠ±ΡΠ³Π°Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΠΌ Π·Π°Π³ΡΠΎΠ·Π°ΠΌ (DLP, UEBA, SIEM);
- ΠΡΠΎΠ²ΠΎΠ΄ΠΈΡΠΈ ΡΠΎΠ·ΡΠ»ΡΠ΄ΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ², ΠΏΠΎΠ²βΡΠ·Π°Π½ΠΈΡ Π· Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ Π·Π°Π³ΡΠΎΠ·Π°ΠΌΠΈ;
- Π ΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΈ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ Π½Π°Π²ΡΠ°Π»ΡΠ½Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π· ΠΏΠΈΡΠ°Π½Ρ Π·Π°ΠΏΠΎΠ±ΡΠ³Π°Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΠΌ Π·Π°Π³ΡΠΎΠ·Π°ΠΌ;
- ΠΠ·Π°ΡΠΌΠΎΠ΄ΡΡΡΠΈ Π· ΡΠ½ΡΠΈΠΌΠΈ Π²ΡΠ΄Π΄ΡΠ»Π°ΠΌΠΈ, Π΄Π»Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠ΄Ρ ΠΎΠ΄Ρ Π΄ΠΎ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ;
- ΠΡΡΠ½ΡΠ²Π°ΡΠΈ ΡΠ° ΠΎΠ½ΠΎΠ²Π»ΡΠ²Π°ΡΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π΄ΠΎΡΡΡΠΏΡ Π΄ΠΎ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ.
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠ° ΠΎΡΠΎΠ±ΠΈΡΡΡΡΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΡΠ΄ΡΠ²Π΅ΡΠ΄ΠΆΠ΅Π½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Ρ ΡΡΠ΅ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 2Ρ ΡΠΎΠΊΡΠ² (Π±Π°ΠΆΠ°Π½ΠΎ Ρ Π²Π΅Π»ΠΈΠΊΠΈΡ ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡΡ );
- ΠΠ½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ Π·Π°ΠΏΠΎΠ±ΡΠ³Π°Π½Π½Ρ Π²ΡΡΠ°ΡΡ Π΄Π°Π½ΠΈΡ (DLP) ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ ΠΏΠΎΠ²Π΅Π΄ΡΠ½ΠΊΠΈ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ² (UEBA);
- ΠΠ»ΠΈΠ±ΠΎΠΊΡ Π·Π½Π°Π½Π½Ρ Π² ΠΎΠ±Π»Π°ΡΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Ρ ΠΏΡΠΈΠ²ΡΠ»Π΅ΡΠΌΠΈ (IAM, PAM);
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠΎΠ·ΡΠ»ΡΠ΄ΡΠ²Π°Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ² ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ ΠΏΠΎΠ²Π΅Π΄ΡΠ½ΠΊΠΈ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ²;
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΈΡ ΡΠ° ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΠΉΠ½ΠΈΡ Π°ΡΠΏΠ΅ΠΊΡΡΠ² Π²Π½ΡΡΡΡΡΠ½ΡΡ Π·Π°Π³ΡΠΎΠ·;
- ΠΠ°Π²ΠΈΡΠΊΠΈ Π°Π½Π°Π»ΡΠ·Ρ Π΄Π°Π½ΠΈΡ ΡΠ° Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ Π°Π½ΠΎΠΌΠ°Π»ΡΠΉ Ρ ΠΏΠΎΠ²Π΅Π΄ΡΠ½ΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ²;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM) Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ;
- ΠΠ½Π°Π½Π½Ρ Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΈΡ Π²ΠΈΠΌΠΎΠ³ Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Ρ ΡΡΠ΅ΡΡ Π·Π°Ρ ΠΈΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ (ISO 27001, NIST, ISO 27701, GDPR) Π±ΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ.
- 1
- 2