Jobs
21-
Β· 51 views Β· 5 applications Β· 1h
Operations Manager (Payments)
Full Remote Β· Countries of Europe or Ukraine Β· 3 years of experience Β· B2 - Upper IntermediateJob Overview Weβre seeking a highly experienced Payments Operations Manager with deep expertise across high-risk merchant processing, international banking workflows, and secure operational environments. This role requires a sharp, detail-driven...β¨Job Overview
Weβre seeking a highly experienced Payments Operations Manager with deep expertise across high-risk merchant processing, international banking workflows, and secure operational environments. This role requires a sharp, detail-driven operator who can manage sensitive financial documentation, ensure airtight compliance, and coordinate seamlessly with global payments partners.
You will oversee mission-critical processes tied to MID acquisition, high-risk merchant onboarding, banking compliance, and the maintenance of multi-jurisdiction corporate structures. Precision, discretion, and exceptional operational discipline are essential.
π οΈKey Responsibilities
- Own and optimize operational infrastructure, including ClickUp and other internal control systems, ensuring workflows meet high-risk security and compliance standards.
- Manage high-risk MID applications end-to-end, coordinating with ISOs, PSPs, acquirers, underwriters, and compliance teams.
- Ensure documentation integrity, verifying KYC/KYB requirements, processing financial statements, PCI forms, descriptors, chargeback histories, and risk disclosures.
- Maintain strict compliance with diverse acquirer requirements across regions (EU, GCC, LATAM, APAC).
- Oversee corporate banking operations, supporting the setup and maintenance of global business accounts in high-security environments.
- Prepare, validate, and submit documentation for international company formations, ensuring alignment with regulatory and tax frameworks.
- Maintain a secure, organized repository of corporate documents, merchant credentials, onboarding files, and bank records.
- Liaise with legal, AML/KYC firms, and regulatory consultants, ensuring full compliance throughout application cycles.
- Support merchant technical integration by updating internal systems post-approval and coordinating with engineering teams.
- Continuously strengthen internal processes to reduce operational risk, eliminate bottlenecks, and improve accuracy and audit-readiness.
- Provide broad administrative and operational oversight, ensuring smooth, compliant, and secure workflows across the organization.
πQualifications
- Bachelorβs degree in Finance, Business Administration, Accounting, or Risk Management; masterβs or certifications (ACAMS, CFE) are a plus.
- Extensive experience in payments operations, high-risk merchant onboarding, compliance, or banking.
- Strong understanding of international regulatory environments, including KYC/KYB, AML, risk classification, and high-risk underwriting.
- Proven ability to manage complex documentation workflows across multiple jurisdictions.
- Expertise with ClickUp or similar systems, plus strong proficiency in Google Workspace and Microsoft Office.
- Exceptional organization, discretion, and accuracy when handling sensitive financial data.
- Track record of working independently, prioritizing well, and delivering under tight deadlines.
- Comfort managing multi-layered security requirements and confidential information.
πPreferred Qualifications
- Experience with high-risk processors and platforms (e.g., Rocketgate, Sticky.io, Konnektive, NMI, Authorize.net, Paynetics, etc.).
- Operational exposure to gateway routing, risk scoring, fraud controls, and merchant monitoring tools.
- Multilingual capabilities for communication with global banking partners.
- Ability to work within or near Dubai time zone.
- Demonstrated success in fast-moving, high-compliance, high-risk environments.
- Startup-oriented mindset with the ability to build structure in dynamic, evolving settings.
πΌWhat We Offer
- Competitive compensation and performance-based bonuses.
- Opportunity to operate inside a rapidly scaling global payments infrastructure.
- High autonomy with a collaborative, international team.
- Exposure to complex, high-risk, multi-jurisdiction operations.
- Clear pathways for professional growth in fintech, payments, and compliance.
More -
Β· 36 views Β· 8 applications Β· 28d
Senior Security Engineer/Architect (Blockchain/Web3)
Full Remote Β· Worldwide Β· 5 years of experience Β· B2 - Upper IntermediateWeβre hiring a Security Engineer/Architect with Blockchain experience who thrives in fast-moving environments, understands technical depth, and can independently own security across multiple areas β from architecture and infrastructure to monitoring and...Weβre hiring a Security Engineer/Architect with Blockchain experience who thrives in fast-moving environments, understands
technical depth, and can independently own security across multiple areas β from architecture and infrastructure to monitoring and investigations.
Youβll be joining a lean team with serious responsibilities β context switching and high autonomy are part of the job. The role is ideal for someone who prefers deep thinking over surface-level βbest practicesβ.
Youβll play a key role in securing our systems and eventually take ownership of technical implementation and decision-making.
We are building a range of products β from an advanced crypto payment solution evolving into a full blockchain ecosystem with real-world impact, to a comprehensive platform featuring its own blockchain, non-custodial wallet, and stablecoin protocol designed for diverse use cases.Requirements
- 5+ years in security engineering, with hands-on experience in DevSecOps and, preferably, Web3;
- Deep understanding of blockchain technologies and integration methods.
- Solid understanding of containerized infrastructure, Kubernetes
- Proven experience working with cloud platforms (AWS, GCP, any experience with bare metal infrastructure will be a huge plus);
- Deep understanding of security principles, such as least privilege, defense in depth, secure defaults, and trust boundaries;
- Strong knowledge of network security (e.g., TLS, VPNs, firewall rules, intrusion detection);
- Familiarity with common vulnerabilities and exploit patterns (e.g., SQLi, XSS, CSRF, SSRF, RCE);
- Understanding of encryption fundamentals (symmetric/asymmetric cryptography, key rotation, secure storage);
- Practical experience with identity and access management (IAM, RBAC, MFA, OAuth2, SSO);
- Proven track record securing production infrastructure (and SDLC as a whole). This also includes implementation and maintenance of the following:
- SIEM platforms;
- SAST/DAST tools;
- Infrastructure as Code (IaC) security scanning tools;
Secrets management (any experience with highly secure HSM stores will be highly appreciated);
Would be a plus
- Expertise in blockchain solutions, VMs, and smart contracts, any prior Solidity experience will be a huge plus;
- Experience with high-performance transaction systems and distributed systems.
- Strong knowledge of microservices patterns, API design, and message brokers (e.g., RabbitMQ, Kafka).
- Familiarity with security policies and standards (e.g., NIST, ISO27001, CIS Benchmarks);
- Experience conducting or preparing for security audits or compliance assessments (SOC2, GDPR, etc.);
- Creating and maintaining playbooks for security incidents, access reviews, and response procedures;
Responsibilities
- Own and maintain internal security tooling (e.g., scanners, linters, alerting systems);
- Design, configure, and maintain security controls across infrastructure (firewalls, IAM policies, network segmentation);
- Continuously update threat models based on real usage and emerging attack patterns;
- Own access control systems for internal and on-chain resources (e.g., multisig ops, key custody, signer policies);
- Perform static and dynamic analysis of codebases, including integrating SAST/DAST tools into CI/CD;
- Stay up to date with emerging vulnerabilities, test their impact on internal systems, and patch proactively;
- Drive the integration of inner account ecosystem projects, ensuring smooth operation;
- Work with DevOps and other product teams to secure cloud and containerized infrastructure;
- Participate in optimization of the platformβs performance, reliability, and fault-tolerance capabilities;
- Act as a technical advisor, mentoring development teams and ensuring architectural consistency.
- Participate in design and implementation of secure architecture across all blockchain layers (Execution, Consensus, etc.);
- Manage security procedures for all core and periphery blockchain tools (explorer, validator portal, etc.);
-
Β· 59 views Β· 2 applications Β· 7d
Information Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· B2 - Upper IntermediateDelasport β Implementing Technological Solutions Here and Now. Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for...Delasport β Implementing Technological Solutions Here and Now.
Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for Sports Betting and Online Casino from a White-Label, with a full range of management services to a Plug&Play iFrame and a complete Turnkey. We are establishing an R&D center in Kyiv, and are looking for top talents to join our team.
This position requires full-time office work. Kyiv, 58 Yaroslavska str.
RESPONSIBILITIES
- Monitor compliance with information security and privacy policies at a technology company.
- Completing vendor security assessments and reviews.
- Reviewing security clauses in customer and vendor contracts.
- Providing, reviewing, and enhancing security training and awareness programs.
- Management of the organizationβs technological risk assessments.
- Helping security leaders to identify and assess risks of the organization and developing strategies to manage and mitigate these risks.
- Develop and implement best practices for assessing and evaluating IT and security controls for the organizationβs third-party businesses.
- Manage the penetration testing and technical risk assessments from end to end.
- Supporting the business with customer engagements, including attending customer calls and supporting our sales teams
REQUIREMENTS
- Minimum of 5 years of experience in a similar role in a technology/software/cloud organization
- Experience implementing and enforcing information security, regulatory, and privacy policies across the business.
- Acquaintance working with cyber security tools and products.
- Solid knowledge of information security principles and practices.
- Knowledge of risk management frameworks and industry compliance standards such as ISO 27001/ SOC2/ PCI DSS
- Excellent interpersonal skills and ability to work in a team with multiple interfaces.
- Experience working at SaaS provider company β an advantage.
- Fluent English
WHAT WE CAN OFFER YOU
- Modern office in Podil with an uninterruptible power supply and the Internet
- Personal time off (21 business days of paid vacation, paid days on special occasions, sick leaves, emergency days off)
- Public holidays
- Health insurance with the broker, which is available from the first month of cooperation
- Life insurance with the broke,r which is available from the first month of cooperation
- Modern technical equipment
- English courses with native speakers
- Ukraine-based educational programs
- Sports activities reimbursement
- Corporate entertainments
- Happy hours on Fridays
- Gig contract support
-
Β· 15 views Β· 0 applications Β· 6d
Information Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· B2 - Upper IntermediateDelasport β Implementing Technological Solutions Here and Now. Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for...Delasport β Implementing Technological Solutions Here and Now.
Delasport is an iGaming Software company providing Sports Betting & Online Casino software and turnkey B2B solutions. Established in 2010, Delasport delivers a one-stop-shop solution for Sports Betting and Online Casino from a White-Label, with a full range of management services to a Plug&Play iFrame and a complete Turnkey. We are establishing an R&D center in Kyiv, and are looking for top talents to join our team.
This position requires full-time office work. Kyiv, 58 Yaroslavska str.
RESPONSIBILITIES
- Monitor compliance with information security and privacy policies at a technology company.
- Completing vendor security assessments and reviews.
- Reviewing security clauses in customer and vendor contracts.
- Providing, reviewing, and enhancing security training and awareness programs.
- Management of the organizationβs technological risk assessments.
- Helping security leaders to identify and assess risks of the organization and developing strategies to manage and mitigate these risks.
- Develop and implement best practices for assessing and evaluating IT and security controls for the organizationβs third-party businesses.
- Manage the penetration testing and technical risk assessments from end to end.
- Supporting the business with customer engagements, including attending customer calls and supporting our sales teams
REQUIREMENTS
- Minimum of 5 years of experience in a similar role in a technology/software/cloud organization
- Experience implementing and enforcing information security, regulatory, and privacy policies across the business.
- Acquaintance working with cyber security tools and products.
- Solid knowledge of information security principles and practices.
- Knowledge of risk management frameworks and industry compliance standards such as ISO 27001/ SOC2/ PCI DSS
- Excellent interpersonal skills and ability to work in a team with multiple interfaces.
- Experience working at SaaS provider company β an advantage.
- Fluent English
WHAT WE CAN OFFER YOU
- Modern office in Podil with an uninterruptible power supply and the Internet
- Personal time off (21 business days of paid vacation, paid days on special occasions, sick leaves, emergency days off)
- Public holidays
- Health insurance with the broker, which is available from the first month of cooperation
- Life insurance with the broke,r which is available from the first month of cooperation
- Modern technical equipment
- English courses with native speakers
- Ukraine-based educational programs
- Sports activities reimbursement
- Corporate entertainments
- Happy hours on Fridays
- Gig contract support
-
Β· 30 views Β· 0 applications Β· 18d
Security Solutions Architect
Hybrid Remote Β· Ukraine Β· Product Β· 2 years of experience Β· B2 - Upper IntermediateThis position is open exclusively for Ukrainian residents within Ukraine (preferably Kyiv or Lviv). We are looking for an Security Solutions Architect to join our Security Engineering team and work with us on building secure software and solutions for...This position is open exclusively for Ukrainian residents within Ukraine (preferably Kyiv or Lviv).
We are looking for an Security Solutions Architect to join our Security Engineering team and work with us on building secure software and solutions for our customers. If you are interested in designing and building security solutions that address complex risks and threats, reviewing and implementing API protocols and subsystems, designing security controls, working hand-in-hand with software developers to build secure systems β this may be the position for you.
Main responsibilities:
- Architect security features, modules and protocols in mission critical software, ensuring alignment with business objectives, functional and non-functional requirements.
- Assess and evaluate the security design of systems, components and their API.
- Search for security weaknesses in software designs from novel fields and areas.
- Perform risk analysis and threat modelling to evaluate available and missing security controls.
- Collaborate with stakeholders, including developers, product managers, and executives, to gather requirements and translate them into security architecture.
- Participate in SSDLC for our products and our customersβ products. Explain architecture choices, work together with developers to select security controls that would improve security without restricting usability/performance.
- Stay up to date with emerging security threats, vulnerabilities, and controls (read articles and papers, follow CVE updates, understand how threat landscape is changing, understand how to apply described ideas, read NIST guidelines).
- Dive into application security, infrastructure security, cloud and on-prem infrastructures, dedicated hardware, IoT security, ML security, and weird stuff beyond casual imagination with our team of skilled engineers. See example of our work.
- Share your work as conference talks, blogposts (see React Native security example, contribute to open source standards like OWASP.
Requirements:
- 2+ years as Solution Architect or similar position.
- Experience designing and implementing security controls in a technically diverse environment.
- Experience in performing design review for multi-component systems (web, cloud, hardware).
- Understanding security standards and methodologies (NIST, ISO, CMMI, SOC).
- Understanding SSDLC and its difficulties. OWASP SSDLC, NIST SSDF.
- Communication skills: you will communicate about security technical topics with both technical and non-technical audiences (C-level managers, developers, product owners).
- An overall understanding of what information security is, how real-world risks and threats affect the choice of security controls. How to combine detective, preventive and corrective controls.
- Experience in popular security tools required for the job, or ability to learn them quickly.
- English level B2+.
Nice to have:
- Understanding risk management and threat modelling (NIST RMF, FAIR, STRIDE, MITRE ATT&CK).
- Understanding of application security verification and software maturity frameworks: OWASP SAMM, OWASP ASVS, OWASP MASVS.
- A certain area of expertise and deep interest: web, cloud, IoT, infrastructure β an area where you have βseen thingsβ and ready to share experience.
- Experience with clouds: AWS, Azure, GCP, understanding the βcloud responsibility gapβ.
- Basic knowledge in cryptography: understanding the differences between symmetric and asymmetric cryptography, hashing, KDF.
- Knowledge in one of several business domains: banking / finance / payment processing, cryptocurrencies.
- Practical experience in any programming language.
Hiring process:
- Resume review β up to 5 business days.
- Introductory meeting with the Head of security engineering.
- Test task β estimated time 1-3 hours.
- Technical interview with several team members.
- Offer discussion.
Whatβs in it for you?
- Competitive compensation with a flexible and clear bonus scheme.
- Paid vacation β 21 business days per calendar year.
- Paid sick leaves.
- Hybrid work model: this position allows for a combination of in-office and remote work as needed.
- Combining technologies: hardware engineering, software engineering, cryptography, information security.
- You will work with people deeply interested in security engineering, you will learn a lot
- Reasonable time budgets and an attitude to build things well β we prioritise building for decades, rather than just until the next release.
- Conferences, books, courses β we encourage learning and sharing with the community. Our team members share a a lot in talks, workshops, and blog posts.
- Public track record in the open-source aspect of our products.
-
Β· 96 views Β· 14 applications Β· 27d
Information/System Security Engineer
Countries of Europe or Ukraine Β· Product Β· 3 years of experience Β· B1 - IntermediateWe`re rapidly growing and inviting an Information/System Security Engineer to our team. You would be running such tasks as: Assess cybersecurity risks and develop measures to minimize them. Implement and administer SOC tools, and integrate threat...We`re rapidly growing and inviting an Information/System Security Engineer to our team.
You would be running such tasks as:
- Assess cybersecurity risks and develop measures to minimize them.
- Implement and administer SOC tools, and integrate threat monitoring systems.
- Manage vulnerabilities, respond to security incidents, analyze root causes, and mitigate attack impacts.
- Handle identity protection and privileged access management.
- Secure Windows, macOS, and Linux endpoints.
- Ensure information and data protection.
- Conduct cybersecurity awareness training and promote best security practices among staff.
- Collaborate closely with Legal, HR, Business & Product Owners, DevOps, IT specialists, and development teams, providing expertise in information security matters.
Required skills and expertise:
- Higher education in Information Security or a related field (Computer Science, Software Engineering, Information Systems, etc.).
- At least 3 years of experience in a similar position.
- Strong understanding of user authentication principles, access control, and information resource management models.
- Experience with OSINT tools and methodologies.
- Hands-on experience with configuring and administering tools such as SIEM, EDR, SOAR, MISP, IDS/IPS.
- Experience in securing server, network, and cloud infrastructures.
- Familiarity with monitoring and logging systems.
- Experience in scripting and automation.
- Experience in Security Incident Response, ability to analyze and interpret data, and prepare reports based on incident investigation results.
- Experience with IT audits and risk management processes.
- Risk-oriented mindset with the ability to assess consequences and implement systemic improvements.
- English level: Intermediate or higher (ability to read technical documentation and correspond in English).
Will be a plus:
- Relevant security certifications and training.
We offer:
Care for your health and well-being
β’ 100β% paid sick leaves;
β’ 20 working days of paid vacation;
β’ Medical support;
β’ Benefits Cafeteria (budget for gym/stomatology/psychological service & etc.);
β’ Ability to work remotely or in the office (as you wish);
β’ Corporate gifts & events.
Professional growth & development
β’ Competitive salary with annual salary promotions;
β’ The annual budget for professional courses, conferences, workshops, and books;
β’ Internal training courses;
β’ Work with a team of professionals and have the opportunity to share knowledge.
Corporate Culture
β’ Dynamic and result-oriented work environment;
β’ The ability to influence product development at an early stage;
β’ Openness to new ideas and approaches, healthy team discussions;
β’ No βred tapeβ culture.
Candidate journey:
HR Interview β Technical Interview β Final Interview
More -
Β· 39 views Β· 1 application Β· 18d
Application Security Engineer
Hybrid Remote Β· Ukraine Β· Product Β· 2 years of experience Β· B2 - Upper IntermediateThis position is open exclusively for Ukrainian residents within Ukraine (preferably Kyiv or Lviv). Cossack Labs is looking for an Application security engineer to join our Security team and work with us on building and breaking software. If you are...This position is open exclusively for Ukrainian residents within Ukraine (preferably Kyiv or Lviv).
Cossack Labs is looking for an Application security engineer to join our Security team and work with us on building and breaking software. If you are interested in designing and building security controls, working hand-in-hand with software developers, performing security assessments, this may be the position for you.
We are ready to invest time in your education if you are prepared to work diligently and responsibly. Alongside technical skills, weβll teach you leadership, time management, business context, and how to keep improving cybersecurity despite the ever-increasing entropy of the world.
Responsibilities:
- Perform security assessment and review of code and behavior of systems (web, API, backends).
- Participate in SSDLC for our products and our customersβ products. Explain risks & threats, work together with developers to select security controls that would improve security without restricting usability/performance.
- Take part in organisation security practices and work with business owners (risk assessment, craft policies for organisations, guide companies for more secure future).
- Stay up to date with emerging security threats, vulnerabilities, and controls (read articles and papers, follow CVE updates, understand how threat landscape is changing, understand how to apply described ideas, read NIST guidelines).
- Dive into application security, infrastructure security, cloud and on-prem infrastructures, dedicated hardware, IoT security, ML security, and weird stuff beyond casual imagination with our team of skilled engineers. See example of our work.
- Share your work as conference talks, blogposts (see Security autotests post), contribute to open source standards like OWASP.
Requirements:
- 2+ years as an application security engineer or similar position.
- Experience in performing security assessment for web applications.
- Experience in selecting or designing security controls in a technically diverse environment.
- Be familiar with application security verification and software maturity frameworks: OWASP SAMM, OWASP ASVS.
- Understanding SSDLC (OWASP SSDLC, NIST SSDF).
- Communication skills: you will communicate about security technical topics with both technical and non-technical audiences (C-level managers, developers, product owners).
- An overall understanding of what information security is, how real-world risks and threats affect the choice of security controls.
- Experience in popular security tools required for the job, or ability to learn them quickly (Burp Suite, network analysers, various SAST and DAST, dependency and vulnerability scanners).
Nice to have:
- A certain area of expertise and deep interest: web, mobile, IoT, infrastructure β an area where you have βseen thingsβ and ready to share experience.
- Basic knowledge in cryptography: understanding the differences between symmetric and asymmetric cryptography, hashing, KDF.
- Understanding security standards and methodologies (NIST, ISO, CMMI, SOC).
- Understanding risk management and threat modelling (NIST RMF, FAIR, STRIDE, MITRE ATT&CK).
- Practical experience in scripting languages: Python or Bash.
Our hiring process:
- Resume review β 1-5 business days.
- Test task β estimated time 3-4 hours.
- Introductory meeting with the Head of security engineering.
- Technical interview with several team members.
- Offer discussion.
Whatβs in it for you?
- A sense of meaning and responsibility for those who seek purpose β weβre building "invisible texture of modern civilizationββbits of infrastructure finance, power grids, healthcare rely on, and we are trusted with very challenging aspects of it.
- Competitive compensation with a flexible bonus scheme.
- Hybrid work model: this position allows for a combination of in-office and remote work as needed.
- UK, EU and USA clients.
- Working at the crossroads of ML security, cryptographic protocol support, hardware protection, reverse-resilient mobile app development, and securing web apps for millions of users.
- Public track record in the open-source aspect of our products.
- Conferences, books, courses β we encourage learning and sharing with the community. Our team members share a lot in talks, workshops, and blog posts.
- Paid vacation β 21 business days per year.
- Paid sick leaves.
We are a data security solutions company, providing custom bespoke solutions to innovative software development teams around the world. Our software is well-known amongst security-aware teams, recommended by OWASP, and popular for easily solving complicated security challenges. Apart from building βoff-the-shelfβ solutions, we design custom security controls for novel problems.
We work in the B2B space, with customers such as IIoT, AI / ML based systems, mission critical systems, robotics, navigation, power grid operators, payment processors, financial apps, legal companies, million-user customer applications. We cater to young ambitious startups and well-established enterprises, who use our software and solutions as core part of their security arsenal. Our customers are smart, but extremely demanding.
Markets: EU, UK, USA, UA.
More -
Β· 59 views Β· 6 applications Β· 21d
Network Security Engineer
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· A2 - Elementary Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠΈΠΌΠΎΠ³ΠΈ:
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°ΡΠΎΠ±ΡΠ² ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΠΏΠΎΠ΄ΡΠΉ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Ρ ΡΠΎΠ±ΠΎΡΠΈ Π· Splunk Security;
- ΠΠ½Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (NIST, ISO 27001, PCI DSS, PA DSS, CIS Controls v8, CSA Cloud Controls, SOC2, OWASP);
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ, SOC;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· IDS/IPS;
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Π·Π°ΡΠΎΠ±ΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΡΠ½ΡΠ΅Π²ΠΈΡ ΡΠΎΡΠΎΠΊ (AV, EDR);
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΠΠ, ΡΠ°ΠΊΠΈΡ ΡΠΊ - IPSec, VPN. TLS, SSL, HTTPS, SSH, PKI;
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΠΈΠΏΡΠ² ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° Π·Π°ΡΠΎΠ±ΡΠ² ΡΡ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, Π»ΠΎΠΊΠ°Π»ΡΠ·Π°ΡΡΡ ΡΠ° ΠΏΡΠΎΡΠΈΠ΄ΡΡ.
ΠΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- Π Π΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ;
- Π ΠΎΠ±ΠΎΡΠ° Π· ΡΡΠ·Π½ΠΈΠΌΠΈ Π΄ΠΆΠ΅ΡΠ΅Π»Π°ΠΌΠΈ ΠΏΠΎΠ΄ΡΠΉ, Π½Π°ΠΏΠΈΡΠ°Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΡΠΎΠ΄ΠΎ Π·Π±ΠΎΡΡ ΡΠ° Π½ΠΎΡΠΌΠ°Π»ΡΠ·Π°ΡΡΡ ΠΏΠΎΠ΄ΡΠΉ Ρ SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» ΠΊΠΎΡΠ΅Π»ΡΡΡΡ Π² SIEM ΡΠΈΡΡΠ΅ΠΌΡ, ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ°ΡΡΠ΅ΡΡΠ² Π΄Π»Ρ Π½Π΅ΠΏΡΠ΄ΡΡΠΈΠΌΡΠ²Π°Π½ΠΈΡ Π΄ΠΆΠ΅ΡΠ΅Π» ΠΏΠΎΠ΄ΡΠΉ;
- Π ΠΎΠ·ΡΠΎΠ±Π»Π΅Π½Π½Ρ Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° Π² Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΌΡ ΡΡΠ°Π½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ², ΡΠΊΡ ΡΡΠΎΡΡΡΡΡΡΡ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- 12 sick days ΡΠ° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ;
- ΠΠΈΡ ΡΠ΄Π½ΠΈΠΉ Π² Π΄Π΅Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ;
- Π ΠΎΠ·Π²ΠΈΡΠΎΠΊ ΡΠ° Π½Π°Π²ΡΠ°Π½Π½Ρ Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠΌΡ ΡΠΎΠ·ΡΡΠ·Ρ;
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΉ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ Π΄Π»Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ;
- ΠΠ»Π°Π½ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡ.
- ΠΡΡΡ Π· Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΈΠΌ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΠΎΠΌ ΡΠ° Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ.
-
Β· 40 views Β· 1 application Β· 21d
Identity Access Management Specialist
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· A2 - Elementary Ukrainian Product πΊπ¦Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ. ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π°...Evoplay β Π½Π°ΠΉΠ±ΡΠ»ΡΡΠ° Π΅ΠΊΠΎ-ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, ΡΠΊΠ° ΠΏΡΠΎΠΏΠΎΠ½ΡΡ ΠΏΡΠΎΠ³ΡΠ΅ΡΠΈΠ²Π½Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΡΠ³ΡΠΎΠ²ΠΎΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ½Π΄ΡΡΡΡΡΡ.
ΠΠΈ Π½Π΅ ΡΡΠΎΡΠΌΠΎ Π½Π° ΠΌΡΡΡΡ Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ ΡΠΎΡΡΠ΅ΠΌΠΎ. ΠΠ°ΡΠ°Π·Ρ Π·βΡΠ²ΠΈΠ»Π°ΡΡ ΡΡΠ΄ΠΎΠ²Π° Π½Π°Π³ΠΎΠ΄Π° ΠΏΡΠΈΡΠ΄Π½Π°ΡΠΈΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Π° ΡΠ°ΠΌΠ΅ Π΄ΠΎ Π²ΡΠ΄Π΄ΡΠ»Ρ Information Security.
ΠΠ΅ΠΎΠ±Ρ ΡΠ΄Π½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° Π½Π°Π²ΠΈΡΠΊΠΈ:
- ΠΠ½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ², ΡΠΎΠ·ΠΌΠ΅ΠΆΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΡ, ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Π΄ΠΎ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ².
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π°Π±ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° IDM\IAM-ΡΠΈΡΡΠ΅ΠΌ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π½Π° Π°Π½Π°Π»ΠΎΠ³ΡΡΠ½ΡΠΉ ΠΏΠΎΠ·ΠΈΡΡΡ Π²ΡΠ΄ 1 ΡΠΎΠΊΡ.
Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π·Π΄ΡΠΉΡΠ½ΡΡΡΡΡΡ ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ Ρ k8s, GitLab, Π±Π°Π·Π°Ρ Π΄Π°Π½ΠΈΡ , AWS.
ΠΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ Π±ΡΠ΄Π΅:
- ΠΠ°ΡΠ²Π½ΡΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ β Certified Access Management Specialist (CAMS)
ΠΡΠ½ΠΎΠ²Π½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ°, ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠΎΠΌ.
- Π£ΡΠ°ΡΡΡ Π² Π°ΡΠ΄ΠΈΡΡ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ².
ΠΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ;
- ΠΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ Π»ΡΠΊΠ°ΡΠ½ΡΠ½Ρ;
- ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ
- Π¦ΡΠΊΠ°Π²Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ, ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠ° ΠΊΠ°Ρ'ΡΡΠ½ΠΎΠ³ΠΎ Π·ΡΠΎΡΡΠ°Π½Π½Ρ;
- ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΡΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ;
- Π‘ΡΡΠ°ΡΠ½ΠΈΠΉ ΠΎΡΡΡ ΡΠ° ΠΊΠΎΠΌΡΠΎΡΡΠ½Π΅ ΡΠΎΠ±ΠΎΡΠ΅ ΠΌΡΡΡΠ΅;
- Π ΡΠ·Π½Ρ ΠΏΠ°ΠΊΠ΅ΡΠΈ ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΠΉ ΡΠ° Π±ΠΎΠ½ΡΡΡΠ² Π·Π°Π»Π΅ΠΆΠ½ΠΎ Π²ΡΠ΄ ΡΡΠΈΠ²Π°Π»ΠΎΡΡΡ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ, ΡΠ΅ΡΠ΅Π΄ ΡΠΊΠΈΡ : ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ Π΄ΠΎ ΡΡΡΠ½ΠΈΡΡ ΡΠΎΠ±ΠΎΡΠΈ, ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π΄ΠΈΡΡΠ°Π΄ΠΊΠ°.
-
Β· 34 views Β· 1 application Β· 7d
Information Security Specialist
Office Work Β· Ukraine (Lviv) Β· Product Β· 1 year of experienceΠΠ°ΡΡΠΎΠ½Π°Π»ΡΠ½Π° ΠΌΠ΅ΡΠ΅ΠΆΠ° Π°ΠΏΡΠ΅ΠΊ Β«ΠΠΎΠ΄ΠΎΡΠΎΠΆΠ½ΠΈΠΊΒ» ΠΎΠ³ΠΎΠ»ΠΎΡΡΡ ΠΊΠΎΠ½ΠΊΡΡΡ Π½Π° ΠΏΠΎΡΠ°Π΄Ρ ΠΠ΄ΠΌΡΠ½ΡΡΡΡΠ°ΡΠΎΡΠ° ΠΏΠΎΠ»ΡΡΠΈΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π’ΠΈ Π½Π°Ρ ΡΠ΄Π΅Π°Π»ΡΠ½ΠΈΠΉ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ, ΡΠΊΡΠΎ: Π΄ΠΎΠ±ΡΠ΅ Π·Π½Π°ΡΡ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, GDPR) Ρ Π²ΠΌΡΡΡ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ ΡΡ Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ...ΠΠ°ΡΡΠΎΠ½Π°Π»ΡΠ½Π° ΠΌΠ΅ΡΠ΅ΠΆΠ° Π°ΠΏΡΠ΅ΠΊ Β«ΠΠΎΠ΄ΠΎΡΠΎΠΆΠ½ΠΈΠΊΒ» ΠΎΠ³ΠΎΠ»ΠΎΡΡΡ ΠΊΠΎΠ½ΠΊΡΡΡ Π½Π° ΠΏΠΎΡΠ°Π΄Ρ ΠΠ΄ΠΌΡΠ½ΡΡΡΡΠ°ΡΠΎΡΠ° ΠΏΠΎΠ»ΡΡΠΈΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Π’ΠΈ Π½Π°Ρ ΡΠ΄Π΅Π°Π»ΡΠ½ΠΈΠΉ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ, ΡΠΊΡΠΎ:
- Π΄ΠΎΠ±ΡΠ΅ Π·Π½Π°ΡΡ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, GDPR) Ρ Π²ΠΌΡΡΡ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ ΡΡ Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ;
- ΠΌΠ°ΡΡ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Ρ ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ, ΠΎΠ½ΠΎΠ²Π»Π΅Π½Π½Ρ ΡΠ° ΡΡΠΏΡΠΎΠ²ΠΎΠ΄Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ ΠΠ;
- Π²ΠΌΡΡΡ ΠΎΡΡΠ½ΡΠ²Π°ΡΠΈ ΡΡ Π½Ρ Π°ΠΊΡΡΠ°Π»ΡΠ½ΡΡΡΡ Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΡΡΡΡ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ Π·ΠΌΡΠ½ΠΈ;
Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡΡ Π· ΡΡΠ·Π½ΠΈΠΌΠΈ ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌΠΈ Π΄Π»Ρ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΡΠ»Π΅ΠΉ Ρ ΡΡΠ΅ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
Π©ΠΎ Π²Ρ ΠΎΠ΄ΠΈΡΠΈΠΌΠ΅ Π² ΡΠ²ΠΎΡ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°Π½Π°Π»ΡΠ·Ρ ΠΏΠΎΡΠΎΡΠ½ΠΈΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, Π² ΡΠ°ΡΡΠΈΠ½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π² ΡΠΈΡΡΠ΅ΠΌΠ°Ρ \ΡΠ΅ΡΠ²ΡΡΠ°Ρ , ΡΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΡΡΡ Π² ΠΠΎΠΌΠΏΠ°Π½ΡΡ;
- ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° Π½ΠΎΠ²ΠΈΡ \ΠΎΠ½ΠΎΠ²Π»Π΅Π½Π½Ρ ΡΡΠ½ΡΡΡΠΈΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, Π² ΡΠ°ΡΡΠΈΠ½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·Π³ΡΠ΄Π½ΠΎ ΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ Π² ΡΠΈΡΡΠ΅ΠΌΠ°Ρ \ΡΠ΅ΡΠ²ΡΡΠ°Ρ , ΡΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΡΡΡ Π² ΠΠΎΠΌΠΏΠ°Π½ΡΡ;
- ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΠΏΡΠΎΡΠ΅Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π½ΠΎΠ²ΠΈΡ \ΠΎΠ½ΠΎΠ²Π»Π΅Π½ΠΈΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, Π² ΡΠ°ΡΡΠΈΠ½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π² ΡΠΈΡΡΠ΅ΠΌΠ°Ρ \ΡΠ΅ΡΠ²ΡΡΠ°Ρ , ΡΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΡΡΡ Π² ΠΠΎΠΌΠΏΠ°Π½ΡΡ;
- ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ Π·Π°ΡΡΠΎΡΠΎΠ²Π½ΠΎΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, Π² ΡΠ°ΡΡΠΈΠ½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π² ΡΠΈΡΡΠ΅ΠΌΠ°Ρ \ΡΠ΅ΡΠ²ΡΡΠ°Ρ , ΡΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΡΡΡ Π² ΠΠΎΠΌΠΏΠ°Π½ΡΡ;
ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°Π½Π°Π»ΡΠ·Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, Π² ΡΠ°ΡΡΠΈΠ½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π΄Π»Ρ ΡΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ Π·ΠΌΡΠ½Π°ΠΌ Π² Π·Π°ΠΊΠΎΠ½ΠΎΠ΄Π°Π²ΡΡΠ²Ρ, ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΡ ΡΠ° Π·Π°Π³ΡΠΎΠ·Π°Ρ .
Π§ΠΎΠΌΡ ΡΠΎΠ±Ρ Π²Π°ΡΡΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ ΡΠ°ΠΌΠ΅ Π² Π½Π°Ρ:
- ΠΎΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ Π² ΡΡΠ°Π±ΡΠ»ΡΠ½ΡΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΠΎ ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ;
- ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΎΡΠΎΠ±ΠΈΡΡΡΡΠ½ΠΎΠ³ΠΎ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·Π²ΠΈΡΠΊΡ;
- Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½Ρ ΡΠ΅ΡΡΡΡΠΈ ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΈ Π΄Π»Ρ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΠΏΠΎΡΡΠ°Π²Π»Π΅Π½ΠΈΡ Π·Π°Π²Π΄Π°Π½Ρ;
- ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ Π½Π° ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½ΡΠΈ ΡΠ° ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΠΎΠ±ΡΠ»ΡΠ³ΠΎΠ²ΡΠ²Π°Π½Π½Ρ;
- Π±ΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ²;
ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ Π½Π° Π°Π±ΠΎΠ½Π΅ΠΌΠ΅Π½ΡΠΈ Π² Sport Life, Π€ΠΎΠΊΡΡΡΠΎΡ, ΠΠΠΠ, Π½Π° ΠΎΠ±ΡΠ»ΡΠ³ΠΎΠ²ΡΠ²Π°Π½Π½Ρ Π² ΠΌΠ΅Π΄ΠΈΡΠ½ΠΈΡ ΡΠ΅Π½ΡΡΠ°Ρ ΠΠ΅ΡΠ΅Π»ΠΊΠ° ΡΠ° Π±Π°Π³Π°ΡΠΎ ΡΠ½ΡΠΈΡ Π±Π΅Π½Π΅ΡΡΡΡΠ².
Π’Π΅Π»Π΅ΡΠΎΠ½ΡΠΉΡΠ΅! ΠΡΠ΄ΠΏΡΠ°Π²Π»ΡΠΉΡΠ΅ ΡΠ΅Π·ΡΠΌΠ΅! ΠΡΠΈΡΠ΄Π½ΡΠΉΡΠ΅ΡΡ Π΄ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ Β«ΠΠΎΠ΄ΠΎΡΠΎΠΆΠ½ΠΈΠΊΒ»
Β«ΠΠΎΠ΄ΠΎΡΠΎΠΆΠ½ΠΈΠΊΒ» β Π»ΡΠ΄Π΅Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ!
More -
Β· 24 views Β· 1 application Β· 5d
Security Project Manager
Hybrid Remote Β· Ukraine Β· Product Β· 5 years of experience Β· B1 - IntermediateΠ‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ! MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ...Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ!
MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ ΠΠ΅Π½Π΅Π΄ΠΆΠ΅ΡΠ° Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π· ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΠ’ ΠΏΡΠΎΠ΅ΠΊΡΡΠ², ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΏΠ»Π°Π½ΡΠ²Π°Π½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΡΡΡΠ΅Π½Π½Ρ, ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡΠ² ΡΠ° ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ, Π°ΡΠ΄ΠΈΡΡ ΡΠ° ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΠΠ΅Π·ΠΏΠ΅ΠΊΠΈ (Π½Π°Π΄Π°Π»Ρ - ΠΠ).Π€ΡΠ½ΠΊΡΡΡ ΠΏΠΎΡΠ°Π΄ΠΈ:
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² ΠΠ Π² ΡΠ°ΠΌΠΊΠ°Ρ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΎΠ΅ΠΊΡΡΠ²
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΈ ΡΠ΅Ρ Π½ΡΡΠ½ΠΈΡ ΡΠ° Π±ΡΠ·Π½Π΅Ρ-ΡΡΡΠ΅Π½Ρ Π½Π° Π΅ΡΠ°ΠΏΡ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ°/Π°Π±ΠΎ Π΅ΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΡΡ Π½Π° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΡΡΡΡ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ ΠΠ
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠΎΡΠ΅ΡΡ Π· ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΠΠ
- Π£ΡΠ°ΡΡΡ Π² ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ ΠΠ
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΡΠΌΡΠ²Π°Π½Π½Ρ ΡΠ΄ΠΈΠ½ΠΈΡ Π²ΠΈΠΌΠΎΠ³ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄ΠΎ ΡΠΈΡΡΠ΅ΠΌ/ΡΠ΅ΡΠ²ΡΡΡΠ² ΠΠΎΠΌΠΏΠ°Π½ΡΡ
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΠ·ΡΠΎΠ±ΡΡ ΡΠ° ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π·Π°Ρ ΠΎΠ΄ΡΠ², ΡΠΏΡΡΠΌΠΎΠ²Π°Π½ΠΈΡ Π½Π° Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΎΠ³ΠΎ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΠΠΎΠΌΠΏΠ°Π½ΡΡ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ
ΠΠΎΠ½ΡΡΠ»ΡΡΡΠ²Π°Π½Π½Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π· ΠΏΠΈΡΠ°Π½Ρ ΠΠ
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠ±ΡΠ΄ΠΎΠ²ΡΠ²Π°Π½Π½Ρ ΠΏΠΎΠ»ΠΎΠΆΠ΅Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΡΠΎΠ΅ΠΊΡΠ½Ρ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ, Π’Π, Π²ΠΈΠΌΠΎΠ³ΠΈ
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ ΡΠΈΠ·ΠΈΠΊΡΠ²
- ΠΡΡΠ½ΠΊΠ° ΡΠ° ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ ΡΠΎΠ΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ, ΡΠ΅ΡΠ²Π΅ΡΡΠ², ΠΌΠ΅ΡΠ΅ΠΆ, Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Azure, AWS)
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ: VPN, MFA, PKI, SIEM, NAC, Π₯DR, DLP, WAF, IAM/IdM, CASB
- ΠΠ°Ρ ΠΈΡΡ ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ (Kubernetes, Docker), Π±Π΅Π·ΠΏΠ΅ΡΠ½Π΅ CI/CD
- Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ»Π°Π½ΡΠ² Π·Π½ΠΈΠΆΠ΅Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ² ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
- ΠΠ·Π°ΡΠΌΠΎΠ΄ΡΡ Π· Π°ΡΠ΄ΠΈΡΠΎΡΠ°ΠΌΠΈ (Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ/Π·ΠΎΠ²Π½ΡΡΠ½ΡΠΌΠΈ)
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°Π±ΠΎ ΡΡΠ°ΡΡΡ Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΊΠ°Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌ ΠΠ
- ΠΠ»ΠΈΠ±ΠΎΠΊΡ Π·Π½Π°Π½Π½Ρ Π² ΠΎΠ±Π»Π°ΡΡΡ ΡΡΠ΅Π½Π΄ΡΠ² ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ·, Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΈΡ ΡΠ½Π΄ΠΈΠΊΠ°ΡΠΎΡΡΠ² ΠΊΠΎΠΌΠΏΡΠΎΠΌΠ΅ΡΠ°ΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΈΡ ΡΠΏΠΎΡΠΎΠ±ΡΠ² ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΊΡΠ±Π΅ΡΠ·Π°Π³ΡΠΎΠ·
- ΠΠ½Π°Π½Π½Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ, ΡΠΎ ΡΠ΅Π³Π»Π°ΠΌΠ΅Π½ΡΡΡΡΡ ΠΏΠΈΡΠ°Π½Π½Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ (ΡΠ΅ΡΡΡ: ISO, NIST)
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ² ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡ, Π°Π»Π³ΠΎΡΠΈΡΠΌΡΠ² ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π· Π²ΡΠ΄ΠΊΡΠΈΡΠΈΠΌ ΡΠ° Π·Π°ΠΊΡΠΈΡΠΈΠΌ ΠΊΠ»ΡΡΠ΅ΠΌ
- ΠΠ½Π°Π½Π½Ρ Π±Π°Π·ΠΎΠ²ΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Π‘Π»ΡΠΆΠ±Π° ΠΊΠ°ΡΠ°Π»ΠΎΠ³ΡΠ², DNS, DHCP, Π€Π°ΠΉΠ»ΠΎΠ²Ρ ΡΠ΅ΡΠ²Π΅ΡΠΈ)
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ Zero Trust, defense-in-depth, risk-based approach
- ΠΠ½Π°Π½Π½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π²ΡΡΡΡΠ°Π»ΡΠ·Π°ΡΡΡ Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (VMware)
- ΠΠ½Π°Π½Π½Ρ Π±Π°Π·ΠΎΠ²ΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΡΠ² (Π‘Π»ΡΠΆΠ±Π° ΠΊΠ°ΡΠ°Π»ΠΎΠ³ΡΠ², DNS, DHCP, Π€Π°ΠΉΠ»ΠΎΠ²Ρ ΡΠ΅ΡΠ²Π΅ΡΠΈ)
- ΠΠ±ΡΠΈΡΠ»ΡΠ²Π°Π»ΡΠ½Ρ ΠΌΠ΅ΡΠ΅ΠΆΡ ΡΠ° ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ: ΠΎΡΠ½ΠΎΠ²ΠΈ ΡΠΎΠΏΠΎΠ»ΠΎΠ³ΡΡ ΠΌΠ΅ΡΠ΅ΠΆ, ΠΎΡΠ½ΠΎΠ²Π½Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ ΡΡΠ΅ΠΊΠ° TCP/IP (IP, TCP, UDP, HTTP/HTTPs)
ΠΠΎΠ½ΡΠ΅ΠΏΡΡΡ API (REST, gRPC, GraphQL)
Π£ΠΏΡΠ°Π²Π»ΡΠ½ΡΡΠΊΡ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠ½Π°Π»ΡΡΠΈΡΠ½Π΅ ΠΌΠΈΡΠ»Π΅Π½Π½Ρ ΡΠ° Π·Π΄Π°ΡΠ½ΡΡΡΡ Π²ΠΈΡΡΡΡΠ²Π°ΡΠΈ ΡΠΊΠ»Π°Π΄Π½Ρ ΡΠ΅Ρ Π½ΡΡΠ½Ρ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈ
- ΠΠΌΡΠ½Π½Ρ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ° ΠΊΠΎΠΌΡΠ½ΡΠΊΡΠ²Π°ΡΠΈ Π· ΡΡΠ·Π½ΠΈΠΌΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»Π°ΠΌΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ
- ΠΡΠ³Π°Π½ΡΠ·ΠΎΠ²Π°Π½ΡΡΡΡ ΡΠ° ΡΠ²Π°Π³Π° Π΄ΠΎ Π΄Π΅ΡΠ°Π»Π΅ΠΉ ΠΏΡΠΈ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΠ°ΠΌΠΈ ΡΠ° ΠΊΠ»ΡΡΠ°ΠΌΠΈ
ΠΠ΄Π°ΡΠ½ΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ Π°Π΄Π°ΠΏΡΡΠ²Π°ΡΠΈΡΡ Π΄ΠΎ Π½ΠΎΠ²ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ²
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City, Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ)
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More -
Β· 110 views Β· 1 application Β· 1d
Red Team Engineer
Hybrid Remote Β· Ukraine Β· 3 years of experience Β· B1 - IntermediateΠΡΠΈΠ²ΡΡ! ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ Red Team Engineer Π΄Π»Ρ ΡΠΎΠ·Π²ΠΈΡΠΊΡ Ρ ΠΏΠΎΡΠΈΠ»Π΅Π½Π½Ρ ΡΡΠ½ΡΡΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ Π½Π°ΠΏΡΡΠΌΠΊΡ Red Team. Π’Π²ΠΎΡΠΌΠΈ Π·Π°Π²Π΄Π°Π½Π½ΡΠΌΠΈ Π±ΡΠ΄ΡΡΡ: ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ red teaming Π°ΠΊΡΠΈΠ²Π½ΠΎΡΡΠ΅ΠΉ, ΡΠΎ ΠΎΡ ΠΎΠΏΠ»ΡΡΡΡ ΠΏΠΎΠ²Π½ΠΈΠΉ ΡΠΈΠΊΠ» β Π²ΡΠ΄ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΡΠ»ΡΠ²Π°Π½Π½Ρ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΠΉ Π΄ΠΎ...ΠΡΠΈΠ²ΡΡ!
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ Red Team Engineer Π΄Π»Ρ ΡΠΎΠ·Π²ΠΈΡΠΊΡ Ρ ΠΏΠΎΡΠΈΠ»Π΅Π½Π½Ρ ΡΡΠ½ΡΡΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ Π½Π°ΠΏΡΡΠΌΠΊΡ Red Team.
Π’Π²ΠΎΡΠΌΠΈ Π·Π°Π²Π΄Π°Π½Π½ΡΠΌΠΈ Π±ΡΠ΄ΡΡΡ:- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ red teaming Π°ΠΊΡΠΈΠ²Π½ΠΎΡΡΠ΅ΠΉ, ΡΠΎ ΠΎΡ ΠΎΠΏΠ»ΡΡΡΡ ΠΏΠΎΠ²Π½ΠΈΠΉ ΡΠΈΠΊΠ» β Π²ΡΠ΄ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΡΠ»ΡΠ²Π°Π½Π½Ρ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΠΉ Π΄ΠΎ Π²ΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ ΡΡΠ»Π΅ΠΉ Π°ΡΠ°ΠΊΠΈ ΡΠ° ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π³ΡΠ°ΡΡΠ² ΡΡΠ΅Π½Π°ΡΡΡΠ² Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡΠ½ΠΎΠ³ΠΎ ΠΏΠ»Π°Π½ΡΠ²Π°Π½Π½Ρ.
- ΠΠ° Π΅ΡΠ°ΠΏΡ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π²ΠΈ Π²ΠΈΠΊΠΎΠ½ΡΠ²Π°ΡΠΈΠΌΠ΅ΡΠ΅ ΠΎΠΏΠ΅ΡΠ°ΡΡΡ Π·Π³ΡΠ΄Π½ΠΎ Π· ΠΏΠ»Π°Π½ΠΎΠΌ, ΡΠΎΠ± Π΄ΠΎΡΡΠ³ΡΠΈ Π²ΠΈΠ·Π½Π°ΡΠ΅Π½ΠΈΡ ΡΡΠ»Π΅ΠΉ, Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΠΈ ΡΡΠ·Π½Ρ Π²Π΅ΠΊΡΠΎΡΠΈ Π°ΡΠ°ΠΊ: ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²Ρ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ, Π²Π΅Π±Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΡΡΠ·ΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΡΡΠΏ, ΡΠΎΡΡΠ°Π»ΡΠ½Ρ ΡΠ½ΠΆΠ΅Π½Π΅ΡΡΡ ΡΠ° ΡΠ½ΡΡ ΠΌΠ΅ΡΠΎΠ΄ΠΈ.
- ΠΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΡ Π· Π·Π°ΠΌΠΎΠ²Π½ΠΈΠΊΠ°ΠΌΠΈ
- ΠΠ°ΠΏΠΈΡΠ°Π½Π½Ρ Π·Π²ΡΡΡΠ²
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Security Awareness Π΄Π»Ρ ΠΠ°ΠΌΠΎΠ²Π½ΠΈΠΊΡΠ²
- Π£ΡΠ°ΡΡΡ Π² ΡΠΎΠ·Π²ΠΈΡΠΊΡ SaaS ΠΏΡΠΎΠ΄ΡΠΊΡΡ
Π©ΠΎ ΠΌΠΈ ΠΎΡΡΠΊΡΡΠΌΠΎ Π²ΡΠ΄ ΡΠ΅Π±Π΅:- 3 ΡΠΎΠΊΠΈ Π΄ΠΎΡΠ²ΡΠ΄Ρ Π² ΡΡΠ΅ΡΡ Π½Π°ΡΡΡΠΏΠ°Π»ΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ΡΡΠ°ΡΡΡ Ρ ΡΡΠ·Π½ΠΈΡ ΠΏΡΠΎΡΠΊΡΠ°Ρ Π· Π΅ΠΌΡΠ»ΡΡΡΡ Π΄ΡΠΉ Π·Π»ΠΎΠ²ΠΌΠΈΡΠ½ΠΈΠΊΡΠ² (red teaming ΡΠ° purple teaming) Π΄Π»Ρ ΠΊΠ»ΡΡΠ½ΡΡΠ² ΡΠ· ΡΡΠ·Π½ΠΈΡ Π³Π°Π»ΡΠ·Π΅ΠΉ.
- ΠΠΊΡΠΏΠ΅ΡΡΠΈΠ·Π° Ρ ΡΡΠ΅ΡΡ Π΅ΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΡΡ Windows Active Directory ΡΠ° Π·Π΄ΡΠΉΡΠ½Π΅Π½Π½Ρ lateral movement Π² ΠΌΠ΅ΡΠ΅ΠΆΡ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· c2 ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΠ°ΠΌΠΈ(Sliver, Cobalt Strike, Havoc, ΡΠΎΡΠΎ)
- ΠΠΎΡΠ²ΡΠ΄ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ΅Ρ Π½ΡΠΊ ΠΎΠ±Ρ ΠΎΠ΄Ρ EDR-ΡΠΈΡΡΠ΅ΠΌ (Endpoint Detection and Response).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π²Π»Π°ΡΠ½ΠΈΡ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Ρ ΠΏΠ΅ΠΉΠ»ΠΎΠ°Π΄ΡΠ², Π° ΡΠ°ΠΊΠΎΠΆ ΡΠ΅Π²Π΅ΡΡ-ΡΠ½ΠΆΠΈΠ½ΡΡΠΈΠ½Π³Ρ
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΡΡΠΈΠ½Π³ΠΎΠ²ΠΈΡ ΠΊΠ°ΠΌΠΏΠ°Π½ΡΠΉ
- ΠΠΎΡΠ²ΡΠ΄ Π· MITRE ATT&CK Framework.
- Π£ΡΠ°ΡΡΡ Ρ security ΡΠΏΡΠ»ΡΠ½ΠΎΡΡ (Π²ΠΈΡΡΡΠΏΠΈ Π½Π° ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΡΡΡ , Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΡ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ², ΠΏΡΠ±Π»ΡΠΊΠ°ΡΡΡ Π² Π±Π»ΠΎΠ³Π°Ρ ).
- ΠΠΎΡΠ²ΡΠ΄ Π· public cloud providers (AWS, Azure, GCP)
- ΠΠ²Ρ Π°Π±ΠΎ Π±ΡΠ»ΡΡΠ΅ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ Π· Π½Π°Π²Π΅Π΄Π΅Π½ΠΈΡ β OSEP, CRTO, CAPE, CCRTS, GRTP
- ΠΠ½Π³Π»ΡΠΉΡΡΠΊΠ° ΠΌΠΎΠ²Π° (Π1+)
ΠΠ»Ρ Π½Π°Ρ Π²Π°ΠΆΠ»ΠΈΠ²ΠΎ, ΡΠΎΠ± ΡΠΈ ΠΌΠ°Π²/-Π»Π°:- ΠΠ΄Π°ΡΠ½ΡΡΡΡ Π½Π΅ ΡΠ΅ΠΊΠ°ΡΠΈ Π½Π° Π·Π°Π²Π΄Π°Π½Π½Ρ, Π° ΡΠ°ΠΌΠΎΡΡΡΠΉΠ½ΠΎ Π·Π½Π°Ρ ΠΎΠ΄ΠΈΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π΄Π»Ρ ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ, Π΄ΡΡΡΠΈ Π½Π° Π²ΠΈΠΏΠ΅ΡΠ΅Π΄ΠΆΠ΅Π½Π½Ρ, Π±Π΅ΡΡΡΠΈ ΡΠ½ΡΡΡΠ°ΡΠΈΠ²Ρ Ρ ΡΠ²ΠΎΡ ΡΡΠΊΠΈ.
- Π£ΡΠ²ΡΠ΄ΠΎΠΌΠ»Π΅Π½Π½Ρ ΠΎΡΠΎΠ±ΠΈΡΡΠΎΠ³ΠΎ Π²Π½Π΅ΡΠΊΡ Π² Π·Π°Π³Π°Π»ΡΠ½ΠΈΠΉ ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ, Π½Π°Π΄ΡΠΉΠ½ΡΡΡΡ Ρ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ Π·ΠΎΠ±ΠΎΠ²βΡΠ·Π°Π½Ρ ΠΏΠ΅ΡΠ΅Π΄ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ ΡΠ° Π·Π°ΠΌΠΎΠ²Π½ΠΈΠΊΠ°ΠΌΠΈ.
- ΠΠΌΡΠ½Π½Ρ Π±ΡΠ΄ΡΠ²Π°ΡΠΈ Π΄ΠΎΠ²ΡΡΠ»ΠΈΠ²Ρ ΡΠ° Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½Ρ ΡΠΎΠ±ΠΎΡΡ ΡΡΠΎΡΡΠ½ΠΊΠΈ, Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ Π΄ΡΠ»ΠΈΡΠΈΡΡ Π·Π½Π°Π½Π½ΡΠΌΠΈ ΡΠ° ΡΠΏΡΠ»ΡΠ½ΠΎ Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΡΡΠ»Π΅ΠΉ.
- ΠΠ°ΠΆΠ°Π½Π½Ρ Π³Π»ΠΈΠ±ΠΎΠΊΠΎ ΡΠΎΠ·ΡΠΌΡΡΠΈ ΠΏΠΎΡΡΠ΅Π±ΠΈ ΠΊΠ»ΡΡΠ½ΡΠ°, ΡΠΎΠ± ΠΏΡΠΎΠΏΠΎΠ½ΡΠ²Π°ΡΠΈ ΡΡΡΠ΅Π½Π½Ρ, ΡΠΊΡ ΠΏΡΠΈΠ½ΠΎΡΡΡΡ ΡΠ΅Π°Π»ΡΠ½Ρ ΡΡΠ½Π½ΡΡΡΡ Π΄Π»Ρ ΠΉΠΎΠ³ΠΎ Π±ΡΠ·Π½Π΅ΡΡ.
- ΠΡΠ°Π³Π½Π΅Π½Π½Ρ Π±ΡΡΠΈ Π½Π°ΠΉΠΊΡΠ°ΡΠΈΠΌ Ρ ΡΠ²ΠΎΡΠΉ ΡΠΏΡΠ°Π²Ρ, ΡΠΎ ΠΏΡΠ΄ΠΊΡΡΠΏΠ»ΡΡΡΡΡΡ ΠΏΠΎΡΡΡΠΉΠ½ΠΈΠΌ ΠΏΠΎΠ³Π»ΠΈΠ±Π»Π΅Π½Π½ΡΠΌ ΡΠ° ΡΠΎΠ·ΡΠΈΡΠ΅Π½Π½ΡΠΌ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΈ, Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½ΡΠΌ ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉ.
- ΠΠ½ΡΡΠΊΡΡΡΡ Ρ ΠΏΡΠ΄Ρ ΠΎΠ΄Π°Ρ , Π·Π΄Π°ΡΠ½ΡΡΡΡ ΡΠ²ΠΈΠ΄ΠΊΠΎ ΡΠ΅Π°Π³ΡΠ²Π°ΡΠΈ Π½Π° Π·ΠΌΡΠ½ΠΈ ΡΠ° Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π² Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΠΎΠΌΡ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΡ.
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:- ΠΠΎΠΌΡΠΎΡΡΠ½Ρ ΠΎΡΡΡΠΈ Π½Π° ΠΊΠΈΡΠ²ΡΡΠΊΠΎΠΌΡ ΠΠΎΠ΄ΠΎΠ»Ρ Π· Π½Π°Π΄ΡΠΉΠ½ΠΈΠΌΠΈ ΡΠΊΡΠΈΡΡΡΠΌΠΈ ΡΠ° Π½Π°ΡΠ²Π½ΡΡΡΡ Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π±ΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΡ, Π²ΠΎΠ΄ΠΎΠΏΠΎΡΡΠ°ΡΠ°Π½Π½Ρ ΡΠ° Π΅Π»Π΅ΠΊΡΡΠΎΠΆΠΈΠ²Π»Π΅Π½Π½Ρ Π² ΠΎΡΡΡΡ. Π’ΠΈ ΠΌΠΎΠΆΠ΅Ρ Π½Π΅ ΡΡΡΠ±ΡΠ²Π°ΡΠΈΡΡ ΠΏΡΠΎ ΡΡΡΠΈΠ½Ρ: ΡΡΡ Π½Π° ΡΠ΅Π±Π΅ ΡΠ΅ΠΊΠ°ΡΡΡ ΡΠ½ΡΠ΄Π°Π½ΠΊΠΈ, ΠΎΠ±ΡΠ΄ΠΈ, Π±Π΅Π·Π»ΡΡ ΡΠ½Π΅ΠΊΡΠ² ΡΠ° ΡΡΡΠΊΡΡΠ², Π»Π°ΡΠ½ΠΆΠ·ΠΎΠ½ΠΈ, ΠΌΠ°ΡΠ°ΠΆ ΡΠ° ΡΠ½ΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΈ ΠΎΡΡΡΠ½ΠΎΠ³ΠΎ ΠΆΠΈΡΡΡ;
- ΠΠ½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ ΡΠΎΠ±ΠΎΡΠΈ;
- ΠΠ½Π»Π°ΠΉΠ½-ΠΏΠΎΡΠ»ΡΠ³ΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΠ³ΠΎ Π»ΡΠΊΠ°ΡΡ, Π° ΠΏΡΡΠ»Ρ Π²ΠΈΠΏΡΠΎΠ±Π½ΠΎΠ³ΠΎ ΡΠ΅ΡΠΌΡΠ½Ρ β ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ Π² Π£ΠΊΡΠ°ΡΠ½Ρ;
- 20 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ² ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½ΠΎΡ Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ Π½Π° ΡΡΠΊ, Π½Π΅ΠΎΠ±ΠΌΠ΅ΠΆΠ΅Π½Π° ΠΊΡΠ»ΡΠΊΡΡΡΡ Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ ;
- Π£ΡΡ Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½Ρ Π΄Π»Ρ ΡΠΎΠ±ΠΎΡΠΈ ΡΠ΅Ρ Π½ΡΠΊΡ;
- ΠΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ Π½Π° ΡΠΈΠ½ΠΊΡ ΠΊΡΡΡΡΠ², ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ ΠΎΠ½Π»Π°ΠΉΠ½-ΠΌΡΡΠ°ΠΏΠΈ ΡΠ° Π»Π΅ΠΊΡΡΡ, Π²Π΅Π»ΠΈΠΊΡ Π±ΡΠ±Π»ΡΠΎΡΠ΅ΠΊΡ, Π±ΡΠ·Π½Π΅Ρ- ΡΠ° ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ ΡΠΊΠΎΠ»ΠΈ Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²;
- ΠΠ΅Π·ΠΏΠ»Π°ΡΠ½Ρ ΡΡΠ΅Π½ΡΠ²Π°Π½Π½Ρ Π· Π±ΡΠ³Ρ, Π²ΠΎΠ»Π΅ΠΉΠ±ΠΎΠ»Ρ, Π±Π°ΡΠΊΠ΅ΡΠ±ΠΎΠ»Ρ, Π±ΠΎΠΊΡΡ, ΡΡΡΠ΅ΡΡΠΈΠ½Π³Ρ ΡΠ° ΠΉΠΎΠ³ΠΈ. ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ Π½Π° Π°Π±ΠΎΠ½Π΅ΠΌΠ΅Π½ΡΠΈ Π² ΡΠΏΠΎΡΡΠ·Π°Π»ΠΈ.
ΠΡΠ΄ΡΡΠΈΠΌΡΡΠΌΠΎ Π£ΠΊΡΠ°ΡΠ½Ρ.πΊπ¦Genesis Π·Π°ΡΡΠ΄ΠΆΡΡ Π²ΡΠΉΠ½Ρ ΡΠΎΡΡΡ ΠΏΡΠΎΡΠΈ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΠΉ Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°Ρ Π΄Π΅ΡΠΆΠ°Π²Ρ Π½Π° Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΠΌΡ, ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΠΌΡ ΡΠ° ΠΊΡΠ±Π΅ΡΡΡΠΎΠ½ΡΠ°Ρ . ΠΠ° ΠΏΠΎΡΠ°ΡΠΊΡ ΠΏΠΎΠ²Π½ΠΎΠΌΠ°ΡΡΡΠ°Π±Π½ΠΎΡ Π²ΡΠΉΠ½ΠΈ ΠΌΠΈ Π·Π°ΡΠ½ΡΠ²Π°Π»ΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΉ Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ½Π΄ Genesis for Ukraine. ΠΠΎΠΌΠ°Π½Π΄Π° ΡΠΎΠ½Π΄Ρ Π·Π°ΠΊΡΠΏΠΎΠ²ΡΡ Π½Π΅ΠΎΠ±Ρ ΡΠ΄Π½Π΅ ΡΠΏΠΎΡΡΠ΄ΠΆΠ΅Π½Π½Ρ, ΡΠ΅Ρ Π½ΡΠΊΡ ΠΉ ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½ΡΠΈ Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² ΡΠ° ΡΡ Π½ΡΡ ΡΠΎΠ΄ΠΈΡΡΠ², ΡΠΎ Π·Π°Ρ ΠΈΡΠ°ΡΡΡ ΠΊΡΠ°ΡΠ½Ρ Π½Π° ΠΏΠ΅ΡΠ΅Π΄ΠΎΠ²ΡΠΉ. ΠΡΡΠΌ ΡΠΎΠ³ΠΎ, ΠΌΠΈ ΠΏΠΎΡΡΡΠΉΠ½ΠΎ Π΄ΠΎΠ½Π°ΡΠΈΠΌΠΎ Π½Π° ΠΠ‘Π£, Π° Π΄Π΅ΠΊΡΠ»ΡΠΊΠ° Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², ΡΡΠ²ΠΎΡΠ΅Π½ΠΈΡ Π² Π΅ΠΊΠΎΡΠΈΡΡΠ΅ΠΌΡ Genesis, Π·ΡΠΎΠ±ΠΈΠ»ΠΈ Π±Π΅Π·ΠΏΠ»Π°ΡΠ½ΠΈΠΌΠΈ Π΄Π»Ρ ΡΠΊΡΠ°ΡΠ½ΡΡΠ². ΠΠ΅ΡΠ°Π»ΡΠ½ΡΡΠ΅ ΠΏΡΠΎ Π½Π°Ρ ΡΡΠΏΡΠΎΡΠΈΠ² β ΡΡΡ Ρ ΡΡΡ.
More
ΠΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ! -
Β· 94 views Β· 10 applications Β· 6d
Security Risk Manager
Hybrid Remote Β· Ukraine Β· Product Β· 1 year of experience Β· B1 - IntermediateΠ’Π²ΠΎΡ ΠΌΠ°ΠΉΠ±ΡΡΠ½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ: ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΠΠ‘Π’ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ (ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ Π· ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ ΡΠ° ΠΎΡΡΠ½ΠΊΠΈ Π·Π°Π³ΡΠΎΠ· ΡΠ° Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ, ΠΎΡΡΠ½ΠΊΠΈ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ², ΠΎΡΡΠ½ΡΠ²Π°Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ², Π° ΡΠ°ΠΊΠΎΠΆ Π·Π°Ρ ΠΎΠ΄ΡΠ² ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ...Π’Π²ΠΎΡ ΠΌΠ°ΠΉΠ±ΡΡΠ½Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΈ:
- ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΠΠ‘Π’ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ (ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΡΡ Π· ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ ΡΠ° ΠΎΡΡΠ½ΠΊΠΈ Π·Π°Π³ΡΠΎΠ· ΡΠ° Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ, ΠΎΡΡΠ½ΠΊΠΈ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ², ΠΎΡΡΠ½ΡΠ²Π°Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ², Π° ΡΠ°ΠΊΠΎΠΆ Π·Π°Ρ ΠΎΠ΄ΡΠ² ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ²)
- ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π²ΠΎΡΠΊΡΠΎΠΏΡΠ² Π· Π±ΡΠ·Π½Π΅Ρ-Π²Π»Π°ΡΠ½ΠΈΠΊΠ°ΠΌΠΈ, ΠΠ’ Π²Π»Π°ΡΠ½ΠΈΠΊΠ°ΠΌΠΈ ΠΠ’ ΡΠΈΡΡΠ΅ΠΌ, Π²Π»Π°ΡΠ½ΠΈΠΊΠ°ΠΌΠΈ ΡΠΈΠ·ΠΈΠΊΡ. Π€Π°ΡΡΠ»ΡΡΠ°ΡΡΡ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ²
- ΠΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ Π·Π°ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½ΠΈΡ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ² ΡΠ° ΡΡΠ²Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ²
- ΠΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΡΠ° ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Π½Ρ Π·Π²ΡΡΠ½ΠΎΡΡΡ ΡΠΎΠ΄ΠΎ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠΌΠΈ
- ΠΠ°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ²Π°Π½Π½Ρ, ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° KPIs/OKRs, Π·Π²ΡΡΠ½ΡΡΡΡ)
- ΠΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΠΏΡΠΎΡΠ΅ΡΡ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ ΡΠ΅Π³ΡΠ»ΡΡΠΎΡΠ½ΠΈΠΌ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΠΌ Π· ΠΏΠΈΡΠ°Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Π’Π²ΡΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠ° Π½Π°Π²ΠΈΡΠΊΠΈ:
- ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ Π·Π½Π°Π½Π½Ρ ΠΌΠ΅ΡΠΎΠ΄ΠΈΠΊ (ΡΡΠ°Π½Π΄Π°ΡΡΡΠ²), Β«best practiceΒ» ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO27005:2018, ISO31000:2018, OCTAVA ΡΠΎΡΠΎ)
- ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΈΠΊΠ»Ρ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠCΠ’ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ/ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
- ΠΠ½Π°Π½Π½Ρ ΡΠΊΠΎΡΠΈΠ½Π³Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ CVSS, Π½Π°Π²ΠΈΡΠΊΠΈ Π°Π½Π°Π»ΡΠ·Ρ Π²ΠΈΡΠ²Π»Π΅Π½ΠΈΡ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ (CWE, CVSS) ΡΠΎΠ΄ΠΎ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΈΡ ΡΠΈΠ·ΠΈΠΊΡΠ², ΠΏΠΎΠ²βΡΠ·Π°Π½ΠΈΡ Π· ΡΡ Π΅ΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΡΡΡ, ΡΠ° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΡΡΡΠΈΡ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ²
- ΠΠ°Π³Π°Π»ΡΠ½Π΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΏΡΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ, ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΠΎΠ±ΠΎΡΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΠΊΠ°ΡΠ΅Π³ΠΎΡΡΠΉ Π·Π°ΡΠΎΠ±ΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (FW, Proxy, IPS/IDS, WAF, SIEM, DLP, EDR ΡΠΎΡΠΎ)
- ΠΠ°Π³Π°Π»ΡΠ½Π΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ (AWS), ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΡΠ·Π°ΡΡΡ (Kubernetes), CI/CD, ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΡ DevOps, cloud-native apps
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΠΏΡΠ΄Ρ ΠΎΠ΄ΡΠ² Π΄ΠΎ Π²ΠΈΠΌΡΡΡΠ²Π°Π½Π½Ρ ΡΡ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ
- ΠΠ½Π°Π½Π½Ρ ΡΠ΅Π³ΡΠ»ΡΡΠΎΡΠ½ΠΈΡ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΡΠ² Π· ΠΏΠΈΡΠ°Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ΠΠΠ£, ISO27001, PCI DSS, SWIFT security framework)
- ΠΠΈΡΠΎΠΊΡ ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½Ρ Π½Π°Π²ΠΈΡΠΊΠΈ, Π²ΠΌΡΠ½Π½Ρ ΠΏΡΠ΅Π·Π΅Π½ΡΡΠ²Π°ΡΠΈ
- ΠΠ½Π°Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ ΡΠ° Π·Π°Π΄Π°ΡΠ°ΠΌΠΈ Jira
ΠΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ ΡΠ΅, ΡΠΎ ΠΌΠ°Ρ Π·Π½Π°ΡΠ΅Π½Π½Ρ ΡΠ°ΠΌΠ΅ Π΄Π»Ρ ΡΠ΅Π±Π΅:
- ΠΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½Π° Π·Π°ΡΠΎΠ±ΡΡΠ½Π° ΠΏΠ»Π°ΡΠ°: Π³Π°ΡΠ°Π½ΡΡΡΠΌΠΎ ΡΡΠ°Π±ΡΠ»ΡΠ½ΠΈΠΉ Π΄ΠΎΡ ΡΠ΄ ΡΠ° ΡΡΡΠ½Ρ Π±ΠΎΠ½ΡΡΠΈ Π·Π° ΡΠ²ΡΠΉ ΠΎΡΠΎΠ±ΠΈΡΡΠΈΠΉ Π²Π½Π΅ΡΠΎΠΊ. ΠΠΎΠ΄Π°ΡΠΊΠΎΠ²ΠΎ, Ρ Π½Π°Ρ Π΄ΡΡ ΡΠ΅ΡΠ΅ΡΠ°Π»ΡΠ½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° Π²ΠΈΠ½Π°Π³ΠΎΡΠΎΠ΄ΠΈ Π·Π° Π·Π°Π»ΡΡΠ΅Π½Π½Ρ Π½ΠΎΠ²ΠΈΡ ΠΊΠΎΠ»Π΅Π³ Π΄ΠΎ Π Π°ΠΉΡΡΠ°ΠΉΠ·Π΅Π½ ΠΠ°Π½ΠΊΡ.
- Π‘ΠΎΡΡΠ°Π»ΡΠ½ΠΈΠΉ ΠΏΠ°ΠΊΠ΅Ρ: ΠΎΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ, 28 Π΄Π½ΡΠ² ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½ΠΎΡ Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ, Π΄ΠΎΠ΄Π°ΡΠΊΠΎΠ²ΠΈΠΉ Β«Π΄Π΅ΠΊΡΠ΅ΡΒ» Π΄Π»Ρ ΡΠ°ΡΡΡΡΠ², ΡΠ° ΠΌΠ°ΡΠ΅ΡΡΠ°Π»ΡΠ½Π° Π΄ΠΎΠΏΠΎΠΌΠΎΠ³Π° Π΄Π»Ρ Π±Π°ΡΡΠΊΡΠ² ΠΏΡΠΈ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ Π΄ΡΡΠ΅ΠΉ.
- ΠΠΎΠΌΡΠΎΡΡΠ½Ρ ΡΠΌΠΎΠ²ΠΈ ΠΏΡΠ°ΡΡ: ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ Π³ΡΠ±ΡΠΈΠ΄Π½ΠΎΠ³ΠΎ ΡΠΎΡΠΌΠ°ΡΡ ΡΠΎΠ±ΠΎΡΠΈ, ΠΎΡΡΡΠΈ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠΊΡΠΈΡΡΡΠΌΠΈ ΡΠ° Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΎΡ ΡΠ΅Ρ Π½ΡΠΊΠΎΡ.
- Wellbeing ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ°: Π΄Π»Ρ Π²ΡΡΡ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π΄ΠΎΡΡΡΠΏΠ½Ρ ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ Π· ΠΏΠ΅ΡΡΠΎΠ³ΠΎ ΡΠΎΠ±ΠΎΡΠΎΠ³ΠΎ Π΄Π½Ρ; ΠΊΠΎΠ½ΡΡΠ»ΡΡΠ°ΡΡΡ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³Π°, Π½ΡΡΡΠΈΡΡΠΎΠ»ΠΎΠ³Π° ΡΠΈ ΡΡΠΈΡΡΠ°; Π΄ΠΈΡΠΊΠΎΠ½Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ Π½Π° ΡΠΏΠΎΡΡ ΡΠ° ΠΏΠΎΠΊΡΠΏΠΊΠΈ; family days Π΄Π»Ρ Π΄ΡΡΠ΅ΠΉ ΡΠ° Π΄ΠΎΡΠΎΡΠ»ΠΈΡ ; ΠΌΠ°ΡΠ°ΠΆ Π² ΠΎΡΡΡΡ.
- ΠΠ°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ: Π΄ΠΎΡΡΡΠΏ Π΄ΠΎ ΠΏΠΎΠ½Π°Π΄ 130 Π½Π°Π²ΡΠ°Π»ΡΠ½ΠΈΡ ΠΎΠ½Π»Π°ΠΉΠ½-ΡΠ΅ΡΡΡΡΡΠ²; ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π½Π°Π²ΡΠ°Π»ΡΠ½Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ Π· CX, Data, IT Security, ΠΡΠ΄Π΅ΡΡΡΠ²Π°, Agile. ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° Π±ΡΠ±Π»ΡΠΎΡΠ΅ΠΊΠ° ΡΠ° ΡΡΠΎΠΊΠΈ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ.
- ΠΡΡΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π°: Π½Π°ΡΡ ΠΊΠΎΠ»Π΅Π³ΠΈ β ΡΠ΅ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠ°, Π΄Π΅ Π²ΡΡΠ°ΡΡΡΡΡ Π΄ΠΎΠΏΠΈΡΠ»ΠΈΠ²ΡΡΡΡ, ΡΠ°Π»Π°Π½Ρ ΡΠ° ΡΠ½Π½ΠΎΠ²Π°ΡΡΡ. ΠΠΈ ΠΏΡΠ΄ΡΡΠΈΠΌΡΡΠΌΠΎ ΠΎΠ΄ΠΈΠ½ ΠΎΠ΄Π½ΠΎΠ³ΠΎ, Π²ΡΠΈΠΌΠΎΡΡ ΡΠ°Π·ΠΎΠΌ ΡΠ° Π·ΡΠΎΡΡΠ°ΡΠΌΠΎ. Π’ΠΈ ΠΌΠΎΠΆΠ΅Ρ Π·Π½Π°ΠΉΡΠΈ ΠΎΠ΄Π½ΠΎΠ΄ΡΠΌΡΡΠ² Ρ ΠΏΠΎΠ½Π°Π΄ 15-ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΠΊΠΎΠΌβΡΠ½ΡΡΡ, ΡΠΈΡΠ°ΡΡΠΊΠΎΠΌΡ ΡΠΈ ΡΠΏΠΎΡΡΠΈΠ²Π½ΠΎΠΌΡ ΠΊΠ»ΡΠ±Π°Ρ .
- ΠΠ°ΡβΡΡΠ½Ρ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ: ΠΌΠΈ Π·Π°ΠΎΡ ΠΎΡΡΡΠΌΠΎ ΠΏΡΠΎΡΡΠ²Π°Π½Π½Ρ Π²ΡΠ΅ΡΠ΅Π΄ΠΈΠ½Ρ Π±Π°Π½ΠΊΡ ΠΌΡΠΆ ΡΡΠ½ΠΊΡΡΡΠΌΠΈ.
- ΠΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ Π·Π°Ρ ΠΈΡΠ½ΠΈΠΊΡΠ² Ρ Π·Π°Ρ ΠΈΡΠ½ΠΈΡΡ: ΠΌΠΈ Π·Π±Π΅ΡΡΠ³Π°ΡΠΌΠΎ ΡΠΎΠ±ΠΎΡΡ ΠΌΡΡΡΡ ΡΠ° Π²ΠΈΠΏΠ»Π°ΡΡΡΠΌΠΎ ΡΠ΅ΡΠ΅Π΄Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½Ρ ΠΏΠ»Π°ΡΡ ΠΌΠΎΠ±ΡΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠΌ. ΠΠ»Ρ Π²Π΅ΡΠ΅ΡΠ°Π½ΡΠ² ΡΠ° Π²Π΅ΡΠ΅ΡΠ°Π½ΠΎΠΊ Ρ Π½Π°Ρ Π΄ΡΡ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ, ΡΠΎΠ·Π²ΠΈΠ²Π°ΡΡΡΡΡ Π²Π΅ΡΠ΅ΡΠ°Π½ΡΡΠΊΠ° ΡΠΏΡΠ»ΡΠ½ΠΎΡΠ° ΠΠ°Π½ΠΊΡ. ΠΠΈ ΠΏΡΠ°ΡΡΡΠΌΠΎ Π½Π°Π΄ ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½ΡΠΌ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΠΊΠ΅ΡΡΠ²Π½ΠΈΠΊΡΠ² ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄ Π· ΠΏΠΈΡΠ°Π½Ρ ΠΏΠΎΠ²Π΅ΡΠ½Π΅Π½Π½Ρ Π²Π΅ΡΠ΅ΡΠ°Π½ΡΠ² Π΄ΠΎ ΡΠΈΠ²ΡΠ»ΡΠ½ΠΎΠ³ΠΎ ΠΆΠΈΡΡΡ. Π Π°ΠΉΡΡΠ°ΠΉΠ·Π΅Π½ ΠΠ°Π½ΠΊ Π²ΡΠ΄Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ ΡΠΊ ΠΎΠ΄ΠΈΠ½ Π· Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΡΠΎΠ±ΠΎΡΠΎΠ΄Π°Π²ΡΡΠ² Π΄Π»Ρ Π²Π΅ΡΠ΅ΡΠ°Π½ΡΠ² (Forbes)
Π§ΠΎΠΌΡ Π Π°ΠΉΡΡΠ°ΠΉΠ·Π΅Π½ ΠΠ°Π½ΠΊ?
ΠΠ°ΡΠ° Π³ΠΎΠ»ΠΎΠ²Π½Π° ΡΡΠ½Π½ΡΡΡΡ β Π»ΡΠ΄ΠΈ Ρ ΠΌΠΈ Π΄Π°ΡΠΌΠΎ ΡΠΌ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ Ρ Π²ΠΈΠ·Π½Π°Π½Π½Ρ, Π½Π°Π²ΡΠ°ΡΠΌΠΎ, Π·Π°Π»ΡΡΠ°ΡΠΌΠΎ Π΄ΠΎ Π·ΠΌΡΠ½. ΠΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ Π Π°ΠΉΡΡ, Π°Π΄ΠΆΠ΅ Π΄Π»Ρ Π½Π°Ρ Π’Π ΠΌΠ°ΡΡ Π·Π½Π°ΡΠ΅Π½Π½Ρ!
- ΠΠ΄ΠΈΠ½ ΡΠ· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΠΊΡΠ΅Π΄ΠΈΡΠΎΡΡΠ² Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠΈ ΡΠ° Π°Π³ΡΠ°ΡΠ½ΠΎΠ³ΠΎ Π±ΡΠ·Π½Π΅ΡΡ ΡΠ΅ΡΠ΅Π΄ ΠΏΡΠΈΠ²Π°ΡΠ½ΠΈΡ Π±Π°Π½ΠΊΡΠ²
- ΠΠΈΠ·Π½Π°Π½ΠΈΠΉ Π½Π°ΠΉΠΊΡΠ°ΡΠΈΠΌ ΠΏΡΠ°ΡΠ΅Π΄Π°Π²ΡΠ΅ΠΌ Π·Π° Π²Π΅ΡΡΡΡΠΌΠΈ EY, Forbes, Randstad, Franklin Covey, Delo.UA
- ΠΠ°ΠΉΠ±ΡΠ»ΡΡΠΈΠΉ Π΄ΠΎΠ½ΠΎΡ Π³ΡΠΌΠ°Π½ΡΡΠ°ΡΠ½ΠΎΡ Π΄ΠΎΠΏΠΎΠΌΠΎΠ³ΠΈΡΠ΅ΡΠ΅Π΄ Π±Π°Π½ΠΊΡΠ² (Π§Π΅ΡΠ²ΠΎΠ½ΠΈΠΉ Π₯ΡΠ΅ΡΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ, UNITED24, Superhumans, Π‘ΠΠΠΠΠΠ)
- ΠΠ΄Π½Π° Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΠΠ’-ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²ΠΈΡ ΠΊΠΎΠΌΠ°Π½Π΄ ΡΠ΅ΡΠ΅Π΄ Π±Π°Π½ΠΊΡΠ² ΠΊΡΠ°ΡΠ½ΠΈ
- ΠΠ΄ΠΈΠ½ ΡΠ· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΠΏΠ»Π°ΡΠ½ΠΈΠΊΡΠ² ΠΏΠΎΠ΄Π°ΡΠΊΡΠ² Π² Π£ΠΊΡΠ°ΡΠ½Ρ, Π·Π° 2023 ΡΡΠΊ Π±ΡΠ»ΠΎ ΡΠΏΠ»Π°ΡΠ΅Π½ΠΎ 6,6 ΠΌΠ»ΡΠ΄ Π³ΡΠΈΠ²Π΅Π½Ρ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π΄Π»Ρ Π²ΡΡΡ :
- Π Π°ΠΉΡ ΠΊΠ΅ΡΡΡΡΡΡΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°ΠΌΠΈ, ΡΠΎ ΡΠΎΠΊΡΡΡΡΡΡΡΡ Π½Π° Π»ΡΠ΄ΠΈΠ½Ρ ΡΠ° ΡΡ ΡΠΎΠ·Π²ΠΈΡΠΊΡ, Ρ ΡΠ΅Π½ΡΡΡ ΡΠ²Π°Π³ΠΈ 5 500 ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² ΡΠ° ΠΏΠΎΠ½Π°Π΄ 2,7 ΠΌΡΠ»ΡΠΉΠΎΠ½ΠΈ ΠΊΠ»ΡΡΠ½ΡΡΠ²
- Π Π Π°ΠΉΡΡ ΠΌΠΈ ΠΏΡΠ΄ΡΡΠΈΠΌΡΡΠΌΠΎ ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈ ΡΡΠ·Π½ΠΎΠΌΠ°Π½ΡΡΡΡ, ΡΡΠ²Π½ΠΎΡΡΡ ΡΠ° ΡΠ½ΠΊΠ»ΡΠ·ΠΈΠ²Π½ΠΎΡΡΡ
- Π ΠΎΠ·Π²ΠΈΠ²Π°ΡΠΌΠΎ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ Π·Π°Ρ ΠΈΡΠ½ΠΈΠΊΡΠ² Ρ Π·Π°Ρ ΠΈΡΠ½ΠΈΡΡ
Π Π Π°ΠΉΡΡ ΡΠΈ ΠΌΠ°ΡΡ Π·Π½Π°ΡΠ΅Π½Π½Ρ!
More -
Β· 153 views Β· 22 applications Β· 7d
CyberSecurity Specialist Senior
Ukraine Β· Product Β· 3 years of experience Β· B1 - Intermediate Ukrainian Product πΊπ¦Uklon β ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Π° IT-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠ°ΠΉΠ΄-Ρ Π΅ΠΉΠ»ΡΠ½Π³ ΡΠ΅ΡΠ²ΡΡ. Π©ΠΎΠ΄Π½Ρ ΠΏΠΎΡΡΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡΠΎΠΊΠ°ΡΡΡ ΠΎΠ΄Π½Ρ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡ Π½Π° ΡΠΈΠ½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π·Π° ΡΡ ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΠΈ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΄ΡΠ°ΠΉΠ²Π΅ΡΡΠ² ΡΠ° ΡΠ°ΠΉΠ΄Π΅ΡΡΠ². ΠΠΈ ΡΡΠ²ΠΎΡΡΡΠΌΠΎ highload...Uklon β ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Π° IT-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠ°ΠΉΠ΄-Ρ Π΅ΠΉΠ»ΡΠ½Π³ ΡΠ΅ΡΠ²ΡΡ. Π©ΠΎΠ΄Π½Ρ ΠΏΠΎΡΡΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡΠΎΠΊΠ°ΡΡΡ ΠΎΠ΄Π½Ρ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡ Π½Π° ΡΠΈΠ½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π·Π° ΡΡ ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΠΈ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΄ΡΠ°ΠΉΠ²Π΅ΡΡΠ² ΡΠ° ΡΠ°ΠΉΠ΄Π΅ΡΡΠ².
ΠΠΈ ΡΡΠ²ΠΎΡΡΡΠΌΠΎ highload ΠΏΡΠΎΠ΄ΡΠΊΡ, Π·Π° ΡΠΊΠΈΠΌ Ρ ΠΎΠ²Π°ΡΡΡΡΡ Π°ΠΌΠ±ΡΡΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Ρ ΡΠ΅Π»Π΅Π½Π΄ΠΆΡ, Π±Π΅Π·ΠΏΠ΅ΡΠ΅ΡΠ²Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΡ ΡΠ° Π½Π΅ΠΎΡΠ΅Π²ΠΈΠ΄Π½Ρ Ρ ΠΎΠ΄ΠΈ. ΠΠ°Ρ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊ ΡΠΎΠ±ΠΎΡΠΈ β ΡΠ΅ΡΡΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π³ΡΠΏΠΎΡΠ΅Π·ΠΈ, ΠΏΡΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ΄Π΅Ρ ΡΠ° Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΠ²Π°ΡΠΈ ΠΎΡΡΠ°Π½Π½ΡΠΉ ΡΡΠ΅ΠΊ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ.
ΠΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ Π½Π°Ρ Ρ ΡΠΎΠ»Ρ CyberSecurity Specialist Senior
Hiring process:ΠΠ½Π°ΠΉΠΎΠΌΡΡΠ²ΠΎ, ΡΠ΅Ρ Π½ΡΡΠ½Π° ΡΠ° ΡΡΠ½Π°Π»ΡΠ½Π° Π·ΡΡΡΡΡΡ.
ΠΠ΅ΡΠ°Π»Ρ ΡΠΎΠ΄ΠΎ ΡΠΎΠ³ΠΎ, ΡΠΊ ΠΏΠΎΠ·Π½Π°ΠΉΠΎΠΌΠΈΡΠΈΡΡ Π· Π½Π°ΡΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ Π΄ΡΠ·Π½Π°Π²Π°ΠΉΡΡ Ρ ΠΡΠ°Π½ΠΈ, IT Recruiter
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ ΡΠ°ΠΌΠ΅ Π΄Π»Ρ ΡΡΡΡ ΡΠΎΠ»Ρ:
β’ ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ ΡΠ· ΡΡΡΠ°ΡΠ½ΠΈΠΌΠΈ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠΌΠΈ (SIEM/XDR/SOAR/DLP/Cloud)
β’ ΠΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠΎΠΊΠ°ΡΠ°ΡΠΈ ΡΠ²ΡΠΉ ΡΠΊΡΠ»Π»ΡΠ΅Ρ Π² ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²Ρ ΠΏΡΠΎΡΠ΅ΡΡΠ² ΡΠ° Π±Π΅Π·ΠΏΠΎΡΠ΅ΡΠ΅Π΄Π½ΡΠΎ Π²ΠΏΠ»ΠΈΠ²Π°ΡΠΈ Π½Π° Π½Π°ΠΏΡΡΠΌ ΡΠΎΠ·Π²ΠΈΡΠΊΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ
β’ Π£ΡΠ°ΡΡΡ Ρ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²Ρ SOC Π· Π½ΡΠ»Ρ ΡΠ° Π±Π΅Π·ΠΏΠΎΡΠ΅ΡΠ΅Π΄Π½ΡΠΉ Π²ΠΏΠ»ΠΈΠ² Π½Π° Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Highload ΠΏΡΠΎΠ΄ΡΠΊΡ, Π·Π° ΡΠΊΠΈΠΌ Ρ ΠΎΠ²Π°ΡΡΡΡΡ Π°ΠΌΠ±ΡΡΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Ρ ΡΠ΅Π»Π΅Π½Π΄ΠΆΡ, Π±Π΅Π·ΠΏΠ΅ΡΠ΅ΡΠ²Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΡ ΡΠ° Π½Π΅ΠΎΡΠ΅Π²ΠΈΠ΄Π½Ρ Ρ ΠΎΠ΄ΠΈ Π² ΡΠΊΠΎΠΌΡ security matters
β’ Π Π΅Π³ΡΠ»ΡΡΠ½ΠΈΠΉ performance & salary review
β’ Π ΡΡΠ½ΠΈΠΉ Π±ΠΎΠ½ΡΡ ΠΏΡΠΈ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΡΡΠ»Π΅ΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ
β’ ΠΡΠ»ΡΡΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π² ΡΠΊΡΠΉ ΠΊΠΎΠΆΠ΅Π½ Ρ Π·Π½Π°ΡΡΡΠΈΠΌ Ρ ΡΡΠ½Π½ΠΈΠΌ ΡΠ° ΠΌΠ°Ρ Π²ΠΏΠ»ΠΈΠ² Π½Π° ΠΏΡΠΎΡΠ΅ΡΠΈ
Π―ΠΊ ΡΠ°ΠΌΠ΅ ΡΠΈ ΠΌΠΎΠΆΠ΅Ρ Π²ΠΏΠ»ΠΈΠ²Π°ΡΠΈ Π½Π° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ:β’ ΠΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΠΊΡΠ±Π΅ΡΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ (L2βL3) Ρ SIEM/XDR
β’ ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠΎΡΠ΅Π½Π·ΡΡΠ½ΠΈΡ ΡΠΎΠ·ΡΠ»ΡΠ΄ΡΠ²Π°Π½Ρ, containment/eradication/recovery
β’ Threat hunting Π·Π° MITRE ATT&CK; ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΡΠ° ΠΎΠΏΡΠΈΠΌΡΠ·Π°ΡΡΡ ΠΏΡΠ°Π²ΠΈΠ» Π΄Π΅ΡΠ΅ΠΊΡΡΡ (KQL/SPL/Sigma)
β’ ΠΠ²ΡΠΎΠΌΠ°ΡΠΈΠ·Π°ΡΡΡ Ρ SOAR (enrichment, ΠΊΠ²ΠΈΡΡΠ²Π°Π½Π½Ρ, Π½ΠΎΡΠΈΡΡΠΊΠ°ΡΡΡ, ΡΠ·ΠΎΠ»ΡΡΡΡ)
β’ ΠΠ½Π°Π»ΡΠ· Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ DLP, ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ°/ΠΎΠΏΡΠΈΠΌΡΠ·Π°ΡΡΡ DLP ΠΏΠΎΠ»ΡΡΠΈΠΊ
β’ ΠΠΏΡΠΈΠΌΡΠ·Π°ΡΡΡ ΡΠΊΠ°Π½ΡΠ²Π°Π½Π½Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ, Π΅ΡΠΊΠ°Π»Π°ΡΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΈΡ ΡΠΈΠ·ΠΈΠΊΡΠ²
β’ Π’Π΅Ρ Π½ΡΡΠ½ΠΈΠΉ Π°ΡΠ΄ΠΈΡ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΠΠ’/ΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² Π· ΡΠΎΠΊΡΡΠΎΠΌ Π½Π° Π±Π΅Π·ΠΏΠ΅ΠΊΡ
β’ ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΠΎΡ ΠΎΡΡΠ½ΠΊΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΠΈΠ·ΠΈΠΊΡΠ²
β’ Π‘ΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· red & blue ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌΠΈ Π² ΠΌΠ΅ΠΆΠ°Ρ purple team
β’ ΠΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π½Π°Π²ΡΠ°Π»ΡΠ½ΠΈΡ ΠΌΠ°ΡΠ΅ΡΡΠ°Π»ΡΠ² Π΄Π»Ρ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Ρ Π½Π°ΡΡΠ°Π²Π½ΠΈΡΡΠ²ΠΎ ΠΌΠΎΠ»ΠΎΠ΄ΡΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ²
Π§Π΅Π»Π΅Π½Π΄ΠΆΡ Π½Π° ΡΡΠΈ ΠΌΡΡΡΡΡ:
β’ ΠΠΎΠ²Π½ΡΡΡΡ Π·Π°Π½ΡΡΠΈΡΠΈΡΡ Ρ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ΅ SOC ΡΠ° ΠΠ’-ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ.
β’ ΠΠΏΠ°Π½ΡΠ²Π°ΡΠΈ ΡΡΠ΅ΠΊ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ, ΡΠΊΠΈΠΉ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΡΡΡ Π² ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Ρ Π·Π°Π½ΡΡΠ΅Π½Π½Ρ Π² Π±ΡΠ·Π½Π΅Ρ-ΠΏΡΠΎΡΠ΅Ρ
β’ ΠΠ·Π½Π°ΠΉΠΎΠΌΠΈΡΠΈΡΡ ΡΠ· ΠΏΠΎΡΠΎΡΠ½ΠΈΠΌΠΈ ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ IR, DLP, SIEM
β’ ΠΡΠΎΠ²Π΅ΡΡΠΈ Π°Π½Π°Π»ΡΠ· Π½Π°ΡΠ²Π½ΠΈΡ use-cases Ρ Π·Π°ΠΏΡΠΎΠΏΠΎΠ½ΡΠ²Π°ΡΠΈ ΠΏΠΎΠΊΡΠ°ΡΠ΅Π½Π½Ρ Π΄Π΅ΡΠ΅ΠΊΡΡΠΉ
β’ Π Π΅Π°Π³ΡΠ²Π°ΡΠΈ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ SLA (MTTD β€ 30 Ρ Π², MTTR β€ 2 Π³ΠΎΠ΄)
ΠΠ»Ρ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡΠ², ΡΠΎΠ±Ρ Π·Π½Π°Π΄ΠΎΠ±Π»ΡΡΡΡΡ:
β’ 3β5+ ΡΠΎΠΊΡΠ² Π΄ΠΎΡΠ²ΡΠ΄Ρ Ρ SOC/IR/DFIR (ΡΠ°ΡΡΠΊΠΎΠ²ΠΎ L2/L3)
β’ ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· SIEM/SOAR (Sentinel, Splunk, Elastic)
β’ ΠΠΎΡΠ²ΡΠ΄ Π½Π°Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ ΠΏΡΠ°Π²ΠΈΠ» DLP ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° DLP ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ
β’ ΠΡΠ°ΠΊΡΠΈΡΠ½Ρ Π½Π°Π²ΠΈΡΠΊΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠΎΡΠ΅Π½Π·ΡΠΊΠΈ
β’ Π‘Π΅ΡΠ΅Π΄Π½ΡΠΉ ΡΡΠ²Π΅Π½Ρ Π²ΠΎΠ»ΠΎΠ΄ΡΠ½Π½Ρ PowerShell Π°Π±ΠΎ Python
β’ Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ MITRE ATT&CK, XDR/EDR
β’ ΠΠ½Π°Π½Π½Ρ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ ΠΌΠΎΠ²ΠΈ Π½Π° ΡΡΠ²Π½Ρ Intermediate
ΠΠΈ, Π·Π²ΡΡΠ½ΠΎ, Π½Π°Π²ΡΠΈΠΌΠΎ, Π°Π»Π΅ Π΄ΠΎΠ±ΡΠ΅ ΠΌΠ°ΡΠΈ:
β’ ΠΠΏΠ΅Π²Π½Π΅Π½Ρ Π·Π½Π°Π½Π½Ρ Π² ΡΠΊΠ°Π½ΡΠ²Π°Π½Π½Ρ ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ, Π»ΠΎΠ³-Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΡ
β’ ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΏΠ΅Π½ΡΠ΅ΡΡΠΈΠ½Π³Ρ
Π―ΠΊ ΡΠΈ ΡΠ΅Π³ΡΠ»ΡΡΡ ΡΠ²ΡΠΉ ΡΠΎΠ±ΠΎΡΠΈΠΉ ΡΠ°Ρ?
β’ Π³Π½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ ΡΡΠ½ΠΊΡΡΠΎΠ½Π°Π»Ρ
β’ days off Π·Ρ Π·Π±Π΅ΡΠ΅ΠΆΠ΅Π½Π½ΡΠΌ Π²ΠΈΠ½Π°Π³ΠΎΡΠΎΠ΄ΠΈ: 20 Π½Π° ΠΎΡΠΎΠ±ΠΈΡΡΡ ΠΏΠΎΡΡΠ΅Π±ΠΈ, ΡΠ΅ 1 Π· Π½Π°Π³ΠΎΠ΄ΠΈ Π΄Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ, 10 ΡΠ΅ΡΠ΅Π· Ρ Π²ΠΎΡΠΎΠ±Ρ, Π΄ΠΎ 8-ΠΌΠΈ Π·Π° Π΄ΠΎΠ½Π°ΡΡΡ ΠΊΡΠΎΠ²Ρ
Π―ΠΊ ΡΠΈ Π±ΡΠ΄Π΅Ρ ΠΏΡΠΎΠΊΠ°ΡΡΠ²Π°ΡΠΈ ΡΠ²ΠΎΡ ΡΠΊΡΠ»ΠΈ Π² Uklon?
β’ Π²Π½ΡΡΡΡΡΠ½ΡΠΉ ΠΎΠ±ΠΌΡΠ½ Π·Π½Π°Π½Π½ΡΠΌΠΈ, ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ ΠΌΠ΅Π½ΡΠΎΡΡΡΠ²Π° ΡΠ° ΡΡΠ΅Π½ΡΠ½Π³ΠΈ Π· ΡΠΎΠ·Π²ΠΈΡΠΊΡ soft ΡΠ° hard skills
β’ ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΠΏΡΠΎΡΡΠ»ΡΠ½ΠΈΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ Π΄Π»Ρ IT-Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ²
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° Π±ΡΠ±Π»ΡΠΎΡΠ΅ΠΊΠ° ΡΠ° ΠΏΡΠ΄ΠΏΠΈΡΠΊΠΈ Π½Π° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Ρ ΡΠ΅ΡΡΡΡΠΈ
β’ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΠΉ/ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΈΠΉ Π±ΡΠ΄ΠΆΠ΅Ρ Π½Π° Π½Π°Π²ΡΠ°Π½Π½Ρ
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ ΡΠ° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ English lessons
β’ long-term Π½Π°Π²ΡΠ°Π½Π½Ρ Π΄Π»Ρ ΠΊΠ΅ΡΡΠ²Π½ΠΈΠΊΡΠ²
Care and support
β’ ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ Π² Π£ΠΊΡΠ°ΡΠ½Ρ
β’ ΠΎΠΏΠ»Π°ΡΡΠ²Π°Π½Ρ ΡΠ΅ΡΡΡ Π· ΠΏΡΠΈΡ ΠΎΡΠ΅ΡΠ°ΠΏΠ΅Π²ΡΠ°ΠΌΠΈ Pleso
β’ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ²ΠΎΡΡ Π±ΡΠΉΡΡΠ² Π² ΠΠ‘Π£ Π°ΠΌΡΠ½ΡΡΡΡΡ ΡΠ° ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½ΡΠ°ΠΌΠΈ
β’ Π³Π΅ΠΉΠΌΡΡΡΠΊΠ°ΡΡΡ, ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ, ΡΠΎΠ·ΡΠ³ΡΠ°ΡΡ ΡΠ° Π·Π½ΠΈΠΆΠΊΠΈ Π²ΡΠ΄ ΠΏΠ°ΡΡΠ½Π΅ΡΡΠ²
β’ ΡΠΏΠΎΡΡΠΈΠ²Π½Ρ Π·Π°Ρ ΠΎΠ΄ΠΈ ΡΠ° ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ ΡΡΠΌΠ±ΡΠ»Π΄ΡΠ½Π³ΠΈ
β’ wellness programs (Π²ΠΎΡΠΊΡΠΎΠΏΠΈ Π΅ΠΌΠΎΡΡΠΉΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ)
β’ ΡΠΈΠΆΠ½Ρ ΠΌΠ°ΡΠ°ΠΆΡ Π² ΠΎΡΡΡΡ Π² ΠΠΈΡΠ²Ρ
β’ ΠΏΡΠΎΠΌΠΎΠΊΠΎΠ΄ΠΈ Π½Π° ΠΏΠΎΡΠ·Π΄ΠΊΠΈ Π· Uklon
Regular Sport Activities:β’ Uklon Football ΡΠΎΡΠΈΠΆΠ½Ρ
β’ Uklon Online & Offline Yoga ΡΠΎΡΠΈΠΆΠ½Ρ
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ, ΡΠ°ΡΡΠΊΠΎΠ²Π° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π·Π°Π½ΡΡΡ ΡΠΏΠΎΡΡΠΎΠΌ
Corporate social responsibility
Uklon ΡΠΎΡΡΠ°Π»ΡΠ½ΠΎ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΈΠΉ Π±ΡΠ·Π½Π΅Ρ Ρ Π²Ρ ΠΎΠ΄ΠΈΡΡ Π² Π’ΠΠ-10 Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ Π΄ΠΎΠ½Π°ΡΠΎΡΡΠ² Π½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ ΡΠΈΠ» ΠΎΠ±ΠΎΡΠΎΠ½ΠΈ ΡΠ° Π³ΡΠΌΠ°Π½ΡΡΠ°ΡΠ½Ρ ΡΠ½ΡΡΡΠ°ΡΠΈΠ²ΠΈ ΡΠ΅ΡΠ΅Π΄ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠΎΠ³ΠΎ Π±ΡΠ·Π½Π΅ΡΡ Π² ΡΠ΅ΠΊΡΠΎΡΡ ΠΠ’ ΡΠ° ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉ. ΠΠ°Π³Π°Π»ΡΠ½ΠΈΠΉ ΠΎΠ±ΡΡΠ³ ΡΡΠ½Π°Π½ΡΠΎΠ²ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠ° ΡΠ½Π²Π΅ΡΡΠΈΡΡΠΉ Uklon, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π²Π½Π΅ΡΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½Ρ Π²Π½Π΅ΡΠΊΠΈ Π·Π°ΡΠ½ΠΎΠ²Π½ΠΈΠΊΡΠ², Π² ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ ΠΠ‘Π£, Π²ΠΎΠ»ΠΎΠ½ΡΠ΅ΡΡΡΠΊΠΈΡ ΡΡΡ ΡΠ², ΠΠ‘Π-ΠΏΡΠΎΡΠΊΡΡΠ² ΡΠ° Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½ΠΈΡ ΡΠ½ΡΡΡΠ°ΡΠΈΠ², Π·Π° ΠΏΠ΅ΡΡΠΎΠ΄ Π· ΡΡΡΠ½Ρ 2022 ΡΠΎΠΊΡ ΠΏΠΎ Π»ΠΈΠΏΠ΅Π½Ρ 2025 ΡΠΎΠΊΡ ΡΠΊΠ»Π°Π² ΠΏΠΎΠ½Π°Π΄ 230 ΠΌΡΠ»ΡΠΉΠΎΠ½ΡΠ² Π³ΡΠΈΠ²Π΅Π½Ρ. Π’Π°ΠΊΠΎΠΆ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Ρ ΡΠ΅ΡΠ΅Π΄ Π½Π°ΠΉΠ²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΠΈΡ ΠΏΠ»Π°ΡΠ½ΠΈΠΊΡΠ² ΠΏΠΎΠ΄Π°ΡΠΊΡΠ² Π² ΠΠ’-ΡΠ΅ΠΊΡΠΎΡΡ, ΡΠΏΠ»Π°ΡΠΈΠ²ΡΠΈ Π·Π° ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠ°ΠΌΠΈ Π΄ΡΡΠ»ΡΠ½ΠΎΡΡΡ Ρ 2024 ΡΠΎΡΡ 680 ΠΌΡΠ»ΡΠΉΠΎΠ½ΡΠ² Π³ΡΠΈΠ²Π΅Π½Ρ ΠΏΠΎΠ΄Π°ΡΠΊΡΠ².
ΠΠ΅ΡΠ΅Π΄ ΠΏΠΎΠ΄Π°Π½Π½ΡΠΌ Π·Π°ΡΠ²ΠΊΠΈ Π½Π° Π²ΡΠ΄ΠΊΡΠΈΡΡ ΠΏΠΎΠ·ΠΈΡΡΡ Π² Uklon, Π±ΡΠ΄Ρ Π»Π°ΡΠΊΠ°, ΠΎΠ·Π½Π°ΠΉΠΎΠΌΡΠ΅ΡΡ Π· Π£ΠΌΠΎΠ²Π°ΠΌΠΈ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ². ΠΠ°Π΄ΡΠΈΠ»Π°ΡΡΠΈ Π½Π°ΠΌ ΡΠ²ΠΎΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½Ρ Π΄Π°Π½Ρ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ΡΡ, ΡΠΎ ΠΌΡΡΡΡΡΡΡΡ Ρ Π²Π°ΡΠΎΠΌΡ ΡΠ΅Π·ΡΠΌΠ΅, Π²ΠΈ Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ ΡΠΈΡ Π£ΠΌΠΎΠ².
*ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ ΠΊΠΎΠΆΠ΅Π½ Π²ΡΠ΄Π³ΡΠΊ Ρ ΠΏΡΠ°Π³Π½Π΅ΠΌΠΎ Π½Π°Π΄Π°ΡΠΈ Π·Π²ΠΎΡΠΎΡΠ½ΠΈΠΉ Π·Π²βΡΠ·ΠΎΠΊ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ 7 ΡΠΎΠ±ΠΎΡΠΈΡ Π΄Π½ΡΠ². Π―ΠΊΡΠΎ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Ρ Π½Π΅ Π±ΡΠ»ΠΎ - Π½Π΅ Π·Π°ΡΠΌΡΡΡΠΉΡΡ: ΠΏΡΠΎΡΡΠΎ ΡΡΠΎΠ³ΠΎ ΡΠ°Π·Ρ ΠΌΠ΅ΡΡ ΡΠ· Π²Π°ΠΊΠ°Π½ΡΡΡΡ Π½Π΅ Π²ΡΠ΄Π±ΡΠ²ΡΡ.
Π―ΠΊΡΠΎ Π½Π΅ Π±Π°ΡΠΈΡ Π»ΠΈΡΡΠ° Π²ΡΠ΄ Π½Π°Ρ - ΠΏΠ΅ΡΠ΅Π²ΡΡ, Π±ΡΠ΄Ρ Π»Π°ΡΠΊΠ°, ΠΏΠ°ΠΏΠΊΡ Β«Π‘ΠΏΠ°ΠΌΒ» ΡΠΈ ΡΠ½ΡΡ Π²ΠΊΠ»Π°Π΄ΠΊΠΈ ΠΏΠΎΡΡΠΈ. ΠΠ½ΠΎΠ΄Ρ Π½Π°ΡΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Ρ ΠΏΠΎΡΡΠ°ΠΏΠ»ΡΡΡΡ ΡΡΠ΄ΠΈ. ΠΡΠΊΡΡΠΌΠΎ, ΡΠΎ ΠΎΠ±ΠΈΡΠ°ΡΡ Uklon. ΠΠΎ Π·ΡΡΡΡΡΡΡ!
More -
Β· 9 views Β· 0 applications Β· 5d
SecOps Engineer
Hybrid Remote Β· Ukraine Β· Product Β· 3 years of experience Β· B1 - IntermediateΠ‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ! MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ...Π‘ΡΠ°Π½ΡΡΠ΅ ΡΠ°ΡΡΠΈΠ½ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠΎ ΡΡΠ²ΠΎΡΡΡ ΡΠΈΡΡΠΎΠ²Ρ ΡΠ΅Π°Π»ΡΠ½ΡΡΡΡ!
MODUS X β ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° ΠΠ’-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΊΠΎΠΌΠ°Π½Π΄Π° 650+ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΈΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² β ΡΠΎΠ·ΡΠΈΡΡΡΠΌΠΎ Π³ΠΎΡΠΈΠ·ΠΎΠ½ΡΠΈ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π±ΡΠ·Π½Π΅ΡΡ, ΡΠΎΠ·ΠΊΡΠΈΠ²Π°ΡΡΠΈ ΠΏΠΎΡΠ΅Π½ΡΡΠ°Π» Π»ΡΠ΄Π΅ΠΉ, ΡΠ΄Π΅ΠΉ ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΠΈ ΡΠΎΠ·ΠΏΠΎΡΠ°Π»ΠΈ ΡΠ° ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆΡΡΠΌΠΎ ΡΡΠΏΡΠΎΠ²ΡΠ΄ ΡΠΈΡΡΠΎΠ²ΠΎΡ ΡΡΠ°Π½ΡΡΠΎΡΠΌΠ°ΡΡΡ ΠΠ’ΠΠ ΡΠ° Π²ΠΆΠ΅ ΠΏΡΠΎΡΡΠ³ΠΎΠΌ ΠΎΡΡΠ°Π½Π½ΡΡ 18 ΡΠΎΠΊΡΠ² ΠΏΡΠΎΡΠΊΡΡΡΠΌΠΎ, ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡΠΌΠΎ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡΠΌΠΎ Π±ΡΠ·Π½Π΅ΡΠΎΠ²Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ, ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½Ρ ΠΠ’ ΠΉ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²Ρ ΡΡΡΠ΅Π½Π½Ρ, ΡΠ° data-driven ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ. ΠΠΈΠ½Ρ Π²ΠΈΠ΄ΡΠ»ΠΈΠ»ΠΈΡΡ Π² ΠΎΠΊΡΠ΅ΠΌΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎΠ±ΠΈ Π΄ΡΠ»ΠΈΡΠΈΡΡ ΡΠ²ΠΎΡΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ ΡΠ° Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΡ, Π·Π°Π»ΠΈΡΠ°ΡΡΠΈΡΡ ΠΠ’-ΠΎΠΏΠΎΡΠΎΡ Π΄Π»Ρ ΡΠΈΡ , Ρ ΡΠΎ Π½Π΅ΡΠ΅ ΡΠ²ΡΡΠ»ΠΎ ΡΠ° ΡΠΏΡΠΈΡΡ Π²ΡΠ΄Π½ΠΎΠ²Π»Π΅Π½Π½Ρ ΠΊΡΠ°ΡΠ½ΠΈ.
ΠΠ°ΡΠ°Π·Ρ ΠΌΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ SecOps ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ°, ΡΠΊΠΈΠΉ Π±ΡΠ΄Π΅ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΈΠΉ Π·Π° ΡΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΡΠΎΡΠ΅ΡΠΈ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΠ’-ΡΡΡΠ΅Π½Ρ. ΠΠΎΠ³ΠΎ Π·Π°Π²Π΄Π°Π½Π½Ρ Π²ΠΊΠ»ΡΡΠ°ΡΠΈΠΌΡΡΡ ΠΎΡΡΠ½ΠΊΡ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΏΡΠ΄ ΡΠ°Ρ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΎΡΠΊΡΡΠ², ΡΠΎΠ·ΡΠΎΠ±ΠΊΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ, ΠΏΡΠΎΡΠΊΡΡΠ²Π°Π½Π½Ρ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ Π· ΡΡΠ°Ρ ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ ΠΠ΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π΄ΠΎΡΡΡΠΏΠ°ΠΌΠΈ ΡΠ° ΡΠ΄Π΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡΡ, Π° ΡΠ°ΠΊΠΎΠΆ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π°ΡΠ΄ΠΈΡΡΠ² Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΠΆΠΈΡΡΡΠ²ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΡ.Π€ΡΠ½ΠΊΡΡΡ ΠΏΠΎΡΠ°Π΄ΠΈ:
- ΠΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π² CI/CD β Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠ΅ΡΠ΅Π²ΡΡΠΎΠΊ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ.
- ΠΠ½Π°Π»ΡΠ· Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ β Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ½Π΅ ΡΠΊΠ°Π½ΡΠ²Π°Π½Π½Ρ ΠΊΠΎΠ΄Ρ, ΠΊΠΎΠ½ΡΠ΅ΠΉΠ½Π΅ΡΡΠ², Π·Π°Π»Π΅ΠΆΠ½ΠΎΡΡΠ΅ΠΉ, ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ.
- ΠΠ΅ΡΡΠ²Π°Π½Π½Ρ ΡΠ΅ΠΊΡΠ΅ΡΠ°ΠΌΠΈ β Π±Π΅Π·ΠΏΠ΅ΡΠ½Π΅ Π·Π±Π΅ΡΡΠ³Π°Π½Π½Ρ ΠΊΠ»ΡΡΡΠ², ΡΠΎΠΊΠ΅Π½ΡΠ², ΠΏΠ°ΡΠΎΠ»ΡΠ².
- ΠΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ β ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² least privilege ΡΠ° Zero Trust.
- ΠΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ Ρ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ β Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ² Ρ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ°Ρ Dev/Test/Prod.
- ΠΠΎΠ»ΡΡΠΈΠΊΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ β ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΉ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·Π°ΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ Π΄Π»Ρ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ ΡΠ° ΠΊΠΎΠ΄Ρ.
- ΠΠ°Π²ΡΠ°Π½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ β ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊΡΠ² ΡΠΎΠ΄ΠΎ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄ΡΠ²Π°Π½Π½Ρ.
ΠΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΡΡΡΡ ΡΡΠ°Π½Π΄Π°ΡΡΠ°ΠΌ β Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎΡΡΡ NIST, ISO 27001, NIS2 ΡΠΎΡΠΎ.
ΠΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΠΊΠΎΠΌΠΏΠ΅ΡΠ΅Π½ΡΡΡ:
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΊΡ ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ½ΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ DevSecOps, ΡΡ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π² pipeline ΡΠΊ Security Gate.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·Π³ΠΎΡΡΠ°Π½Π½Ρ ΡΠ° Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ (SAST, DAST, SCA, ASOC, Container/Kubernetes Security).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ, ΠΏΡΠΎΠ΅ΠΊΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΡ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ΅Π½Π°ΡΡΡΠ² Π°ΡΠ°ΠΊ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ ΡΠ°ΠΊΡΠΈΠΊ ΡΠ° ΡΠ΅Ρ Π½ΡΠΊ MITRE ATT&CK.
- ΠΠΎΡΠ²ΡΠ΄ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΎΠ³ΠΎ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ ΡΠ°ΠΊΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° Π½Π°ΠΉΠΊΡΠ°ΡΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊ ΡΠΊ OWASP Security Standards, CIS Controls, NIST Cybersecurity Framework, SANS.
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΠΉ Shift-Left, ZeroTrust, SSDLC;
- ΠΠ½Π°Π½Π½Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π· OWASP Top-10 (web/mobile/api), ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΊ Π²ΠΎΠ½ΠΈ Π²ΠΈΠ½ΠΈΠΊΠ°ΡΡΡ ΡΠ° ΡΠΊ ΠΌΠΈΡΡΠ³ΡΡΡΡΡΡ.
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΡΠ°ΠΆΡ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ Π² ΡΠ°ΠΊΠΈΡ ΠΌΠΎΠ²Π°Ρ ΠΏΡΠΎΠ³ΡΠ°ΠΌΡΠ²Π°Π½Π½Ρ (Ρ ΠΎΡΠ° Π± ΠΌΡΠ½ΡΠΌΠ°Π»ΡΠ½ΠΈΠΉ): Python, Java, JS, PHP, .NET.
- ΠΠΎΡΠ²ΡΠ΄ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ² Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Azure AWS, K8s.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅ΡΠ²ΡΡΠ°Ρ Azure (Azure Security Center, Azure Defender, Azure Policy), AWS (GuardDuty, CloudTrail), GCP.
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· key vault, hashicorp vault, BYOK.
- ΠΠ½Π°Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΡΡΡΠΊΡΡΡ, ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΠ° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡ Π°Π²ΡΠ΅Π½ΡΠΈΡΡΠΊΠ°ΡΡΡ/Π°Π²ΡΠΎΡΠΈΠ·Π°ΡΡΡ (OAuth 2.0, OIDC, JWT).
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΠΎΠ΄Π½ΠΈΠΌ Π°Π±ΠΎ Π΄Π΅ΠΊΡΠ»ΡΠΊΠΎΠΌΠ° ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ CI/CD (Azure DevOps, Gitlab, Ansible, Terraform).
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ ΡΠ· ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ ΠΊΠΎΠ»Π΅ΠΊΡΠΈΠ²Π½ΠΎΡ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ, Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΠΏΡΠΎΠ΅ΠΊΡΡΠ² ΡΠ° ΡΠ΅ΠΏΠΎΠ·ΠΈΡΠΎΡΡΡΠ² (AzDO, Git, Confluence, Jira).
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ
- KΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Π·Π°ΡΠΎΠ±ΡΡΠ½ΠΎΡ ΠΏΠ»Π°ΡΠΈ ΡΠ° ΡΠΎΡΡΠ°Π»ΡΠ½Ρ Π³Π°ΡΠ°Π½ΡΡΡ
- ΠΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΌΠ΅Π΄ΠΈΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ° ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΡΡΠ½ΠΎΡ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠΈ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ²
- Π ΠΎΠ±ΠΎΡΡ Π² ΡΠ½Π½ΠΎΠ²Π°ΡΡΠΉΠ½ΠΎΠΌΡ ΠΏΠ°ΡΠΊΡ Unit City, Π°Π±ΠΎ Π²ΡΠ΄Π΄Π°Π»Π΅Π½ΠΎ
ΠΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΠΉ ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ (ΠΎΠ½Π»Π°ΠΉΠ½ ΠΊΡΡΡΠΈ, Π°ΡΠ΄ΠΈΡΠΎΡΠ½Ρ ΡΡΠ΅Π½ΡΠ½Π³ΠΈ, ΠΌΠ°ΠΉΡΡΠ΅Ρ-ΠΊΠ»Π°ΡΠΈ, ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½Ρ ΡΠΏΡΠ»ΡΠ½ΠΎΡΠΈ)
ΠΠΈ ΡΡΠ½ΡΡΠΌΠΎ Π²Π°Ρ ΡΠ½ΡΠ΅ΡΠ΅Ρ Π΄ΠΎ MODUS X ΡΠ° Π³ΠΎΡΠΎΠ²Π½ΡΡΡΡ ΠΏΡΠΈΠΉΠΌΠ°ΡΠΈ Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ. Π’ΡΡ ΠΊΠΎΠΆΠ΅Π½ ΠΌΠΎΠΆΠ΅ ΡΠΎΠ·ΠΊΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ°Π»Π°Π½ΡΠΈ ΠΉ Π·ΡΠΎΠ±ΠΈΡΠΈ Π²Π½Π΅ΡΠΎΠΊ Ρ ΡΠΏΡΠ»ΡΠ½ΠΈΠΉ ΡΡΠΏΡΡ . ΠΠΈ ΡΠ½Π²Π΅ΡΡΡΡΠΌΠΎ Π² ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ, Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΌΠΎ ΠΎΡΡΠΈΠΌΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π·Π½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΡΠ³Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΡΡΠ»Π΅ΠΉ.
ΠΠ°ΡΠ° ΠΊΠΎΠΌΠ°Π½Π΄Π° ΡΠ²Π°ΠΆΠ½ΠΎ ΡΠΎΠ·Π³Π»ΡΠ΄Π°Ρ Π²ΡΡ Π·Π°ΡΠ²ΠΊΠΈ, Ρ ΡΠΊΡΠΎ Π²Π°ΡΠ° ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΡΠ° Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Ρ Π²ΠΈΠΌΠΎΠ³Π°ΠΌ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΡΠ΅ΠΊΡΡΡΠ΅Ρ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΎ Π·Π²βΡΠΆΠ΅ΡΡΡΡ Π· Π²Π°ΠΌΠΈ Π²ΠΏΡΠΎΠ΄ΠΎΠ²ΠΆ 2 ΡΠΈΠΆΠ½ΡΠ².
ΠΡΠ»ΡΡΠ΅ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΠΏΡΠΎ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° Π½Π°Ρ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π° ΠΎΡΡΡΡΠΉΠ½ΡΠΉ ΡΡΠΎΡΡΠ½ΡΡ MODUS X Π² LinkedIn.
ΠΠ°ΠΏΡΠ°Π²Π»ΡΡΡΠΈ ΡΠ΅Π·ΡΠΌΠ΅ Π½Π° ΡΡ Π²Π°ΠΊΠ°Π½ΡΡΡ, ΠΠΈ Π½Π°Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π’ΠΠ Β«ΠΠΠΠ£Π‘ ΠΠΠ‘Β» Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ Π½Π°Π΄Π°Π½ΠΈΡ ΠΠ°ΠΌΠΈ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π·Π³ΡΠ΄Π½ΠΎ ΠΠ°ΠΊΠΎΠ½Ρ Π£ΠΊΡΠ°ΡΠ½ΠΈ Β«ΠΡΠΎ Π·Π°Ρ ΠΈΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Β». ΠΠ³ΠΎΠ΄Π° Π½Π°Π΄Π°ΡΡΡΡΡ Π² ΡΠΎΠΌΡ ΡΠΈΡΠ»Ρ Π΄Π»Ρ ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ Π² Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ , Π· ΠΌΠ΅ΡΠΎΡ ΡΡΠΏΡΠΎΠ²ΠΎΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡ Π½Π°ΠΉΠΌΡ.
More
- 1
- 2