Jobs

73
  • Β· 17 views Β· 4 applications Β· 1d

    Head of IT Operations and Security

    Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 5 years of experience Β· Upper-Intermediate Ukrainian Product πŸ‡ΊπŸ‡¦
    We’re looking for a sharp, business-oriented expert to lead Information Security, IT Systems, and Automation initiatives across the company β€” someone who balances strategic thinking with hands-on execution and turns complexity into secure, scalable, and...

    We’re looking for a sharp, business-oriented expert to lead Information Security, IT Systems, and Automation initiatives across the company β€” someone who balances strategic thinking with hands-on execution and turns complexity into secure, scalable, and streamlined solutions that truly serve business goals.

     

    You don’t just manage systems β€” you align systems with business needs.

    You don’t just run security β€” you see and mitigate risks before they become problems..

    You don’t just automate β€” you transform.

     

    If you thrive in complexity, love solving meaningful problems, and think like an expert partner (not just a task executor) β€” this role is for you.

     

    Requirements:
     

    - Ability to analyze complex security issues and deliver effective, practical solutions.

    - Deep knowledge of information security principles, standards, network protection, encryption, and secure coding practices.

    - Proficiency in conducting risk assessments, vulnerability assessments, and penetration testing.

    - Experience managing or working with Ops, DevOps, Jira, Helpdesk, and Development teams.

    - Competence in managing IT audits, performance evaluations, and cost-efficient planning.

    - Solid background in IT architecture design, systems integration (ERP, CRM, HRM, project management tools), and optimization.

    - Ability to lead complex IT projects and large-scale system migrations.

    - Track record of engaging external experts to enhance delivery where required.
    - English - Upper-Intermediate level.

     

    Personal qualities:
     

    - Strong project and team management skills, with the ability to lead cross-functional teams and delegate effectively while staying hands-on when needed.

    - Accountable and self-driven β€” you follow through without reminders.

    - Solution-oriented - you bring problems with proposed solutions.

    - Open to feedback, adaptable to change, and persistent when you believe in the idea.

    - Fast and responsive - you act quickly, avoid overcomplicating, while thinking long-term.

    - Data- and result-driven β€” you base decisions on facts and aim for real outcomes. 

    - Customer-focused – with a strong understanding of service mindset and what it means to create value for clients.

    - Strong communicator β€” you align, clarify, and solve across all levels.

    - High standards β€” you raise the bar, not settle for β€œgood enough.”

    - Able to prioritize what truly creates value for the business.

     

    Responsibilities:

    Information Security & Risk Management:

    - Develop and implement security policies, standards, and procedures.

    - Manage access control and protect internal systems.

    - Conduct risk assessments and monitor security threats.

    - Respond to incidents and mitigate vulnerabilities.

    - Educate employees on security best practices.
     

    IT Systems & Infrastructure

    - Maintain an optimized, scalable, and secure architecture, aligned with business priorities.

    - Ensure system integration, data integrity, and interoperability across core platforms (CRM, ERP, HRM, etc.).

    - Oversee technical operations teams to ensure efficient and secure operations.

    - Drive automation and process improvements.
     

    Automation & AI Initiatives

    - Identify and implement high-impact automation and AI opportunities.

    - Ensure effective integration of AI tools into business processes.

    - Measure effectiveness and business impact of implemented solutions.

    - Coordinate cross-functional automation initiatives and promote knowledge-sharing.

    - Involve external expertise to strengthen outcomes where needed.

     

    What we offer:

    - Flexible schedule. You can work remotely or from our comfortable offices. The workday starts from 8:00 to 11:00;

    - Time Offs Loyalty System - 28 Business Days of Paid Time Off per year (after 3 months of cooperation);

    - We care about your health. We guarantee that we will cover your medical insurance once your probation period is over. And once a year, we organize a flu shot;

    - Mental Health webinars where we discuss psychological topics.

    - Professional Growth and Development Personal Development Plan, internal educational activities, reimbursement of external educational activities, including the ones abroad.

    - English Courses and Speaking Clubs;

    - Corporate currency - Boosta coins and spend them on extra day-offs or our branded products (from T-shirts to AirPods).


    What stages do we have:

    β€’ 1st stage: pre-screen with recruiter;

    β€’ 2nd stage: interview with hiring manager;

    β€’ 3nd stage: test task 

    β€’ 4nd stage: bar-raising
    β€’ 5th stage: referrals and offer.

     

    Apply now and become a Head of IT Operations & Security!

    More
  • Β· 15 views Β· 3 applications Β· 1d

    Information Security Officer (ISO)

    Full Remote Β· Worldwide Β· Product Β· 5 years of experience Β· Intermediate
    Company: Developer of a B2C trading platform Company size: 150+ employees and growing Work format: remote Reporting to: CEO, close collaboration with CTO Why is this role exciting? This is a unique opportunity to build the security function from the...

    Company: Developer of a B2C trading platform

    Company size: 150+ employees and growing

    Work format: remote

    Reporting to: CEO, close collaboration with CTO

     

    Why is this role exciting?

    This is a unique opportunity to build the security function from the ground up in a fast-growing tech company. You’ll be working in a young and friendly team, tackling real security challenges rather than focusing on compliance and certification. The company values practical and efficient security that brings real benefits to the business.

    The role offers plenty of interesting challenges, room for professional growth, and the opportunity to set up the security function as needed. If you’re passionate about hands-on security, solving real-world security problems, and making an impact, this role is for you!

     

    Responsibilities:

    • Building a corporate information and cybersecurity system from scratch, aligning with business strategy and leadership expectations
    • Identify security risks in business processes, evaluate, and prioritise mitigation controls
    • Executethe cybersecurity roadmap with alignment to the emerging threats
    • Implementing and managing access control (SSO, MFA, RBAC)
    • Developing and enforcing information security policies for personal data protection (PII), information, and access management procedures
    • Establishing vulnerability management processes
    • Control network and application security resilience against attacks (DDoS, takeovers, injections, etc.),
    • Developing and implementing workstation security with Mobile Device Management (MDM) policies and XDR tools
    • Collaborating with IT and development teams on the platform’s security architecture, customer security aspects in products, and enabling DevSecOps
    • Lead the security incident management process, orchestration, and control execution
    • Conducting security training and fostering a strong security culture

       

    Requirements:

    • 5+ years of experience in information security
    • Strong knowledge in security frameworks such as ISO27000, NIST, SOC, CSI or similar
    • Practical understanding of IAM, PII protection built into the operational process of the company
    • Experience in setting up vulnerability and patch management processes
    • Familiarity with security threats and mitigation practices for DDoS, brute forces, injections, etc.
    • Experience in mobile security, anti-virus tools, and BYOD policies
    • Understanding of DevSecOps and the secure software development concept
    • Ability to design security processes from scratch and their adoption
    • Practical knowledge of cryptocurrencies and the risks associated with crypto
    • Excellent communication and reporting skills
    • Agility in risk management

     

    Nice to have:

    • Experience in fintech companies or trading platforms
    • Experience in implementing SOC, DLP, and SIEM
    • Knowledge of compliance frameworks (GDPR, PCI DSS)

     

    We offer flexibility in discussing terms, building a team, and providing the necessary resources to create a strong, practical security system that truly benefits the business.

    More
  • Β· 12 views Β· 2 applications Β· 1d

    Information Security Manager

    Full Remote Β· Ukraine Β· 3 years of experience Β· Upper-Intermediate
    Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clients’ digital assets. Responsibilities: Implement security measures in alignment with industry frameworks. Conduct security...

    Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clients’ digital assets.

    Responsibilities:

    • Implement security measures in alignment with industry frameworks.
    • Conduct security assessments for client projects using established methodologies and provide actionable recommendations.
    • Collaborate with development teams to identify risks and implement the most efficient security solutions.
    • Promote security services by engaging with clients and presenting solutions.

    Requirements:

    • 3+ years of experience with security frameworks such as ISO 27001, SOC 2, or NIST CSF.
    • Knowledge of cloud security, with practical experience, is a plus.
    • Understanding of Secure SDLC and software security architecture is a plus.
    • Ability to engage clients and provide expert security consulting.
    • A structured approach to work and clear documentation skills.
    • Ability to automate tasks using any programming language and AI tools.
    • Upper-Intermediate English or higher.

    Our benefits:

    GROWTH & EDUCATION

    • Individual development plan.
    • Mentoring program.
    • Evaluation process.
    • Professional education.
    • Covering the cost of professional certifications.
    • Corporate library.
    • English classes.

    COMMUNITY

    • Technological community.
    • Volunteering & Charity.
    • Yalantis events.
    • Yalantis Education.
    • Project team building activities.

    WELLBEING

    • Medical insurance, health check-ups, and compensation for sports activities are up to you.
    • Vacation & Days Off.
    • Mental health support program.
    • Public holidays.
    • Financial and legal support for private entrepreneurs.

    WORK ENVIRONMENT

    • Cozy offices (Dnipro, Kyiv, Warsaw).
    • Corporate Top-notch equipment and quality tools.
    • Flexible format of work.
    • Eco & Pet-friendly space.
    • Fun activities in offices.
    • Y-bucks & Yalantis store.

    Please note that feedback with the results of the CV review will be provided only in the event of a decision to consider your candidacy further.
    Otherwise, your data will be retained in the company’s CV database, and we will gladly contact you if a suitable vacancy becomes available. The consideration period is 7 working days.

    More
  • Β· 11 views Β· 1 application Β· 1d

    Corporate Security Lead

    Full Remote Β· Ukraine Β· Product Β· 5 years of experience Β· Intermediate Ukrainian Product πŸ‡ΊπŸ‡¦
    Uklon β€” ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ²Π° IT-компанія, Ρ‰ΠΎ розробляє ΠΏΡ€ΠΎΠ²Ρ–Π΄Π½ΠΈΠΉ Ρ€Π°ΠΉΠ΄-Ρ…Π΅ΠΉΠ»Ρ–Π½Π³ сСрвіс. Щодня ΠΏΠΎΡ‚ΡƒΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡ€ΠΎΠΊΠ°Ρ‡ΡƒΡ” ΠΎΠ΄Π½Ρƒ Π· Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆΠΈΡ… інфраструктур Π½Π° Ρ€ΠΈΠ½ΠΊΡƒ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ Ρ‚Π° Π·Π° Ρ—Ρ— ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡŽΡ‡ΠΈ Π²Π·Π°Ρ”ΠΌΠΎΠ΄Ρ–ΡŽ Π΄Ρ€Π°ΠΉΠ²Π΅Ρ€Ρ–Π² Ρ‚Π° Ρ€Π°ΠΉΠ΄Π΅Ρ€Ρ–Π². Ми ΡΡ‚Π²ΠΎΡ€ΡŽΡ”ΠΌΠΎ highload...
    Uklon β€” ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ²Π° IT-компанія, Ρ‰ΠΎ розробляє ΠΏΡ€ΠΎΠ²Ρ–Π΄Π½ΠΈΠΉ Ρ€Π°ΠΉΠ΄-Ρ…Π΅ΠΉΠ»Ρ–Π½Π³ сСрвіс. Щодня ΠΏΠΎΡ‚ΡƒΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡ€ΠΎΠΊΠ°Ρ‡ΡƒΡ” ΠΎΠ΄Π½Ρƒ Π· Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆΠΈΡ… інфраструктур Π½Π° Ρ€ΠΈΠ½ΠΊΡƒ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ Ρ‚Π° Π·Π° Ρ—Ρ— ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡŽΡ‡ΠΈ Π²Π·Π°Ρ”ΠΌΠΎΠ΄Ρ–ΡŽ Π΄Ρ€Π°ΠΉΠ²Π΅Ρ€Ρ–Π² Ρ‚Π° Ρ€Π°ΠΉΠ΄Π΅Ρ€Ρ–Π².

    Ми ΡΡ‚Π²ΠΎΡ€ΡŽΡ”ΠΌΠΎ highload ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚, Π·Π° ΡΠΊΠΈΠΌ Ρ…ΠΎΠ²Π°ΡŽΡ‚ΡŒΡΡ Π°ΠΌΠ±Ρ–Ρ‚Π½Ρ– Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½Ρ– Ρ‡Π΅Π»Π΅Π½Π΄ΠΆΡ–, Π±Π΅Π·ΠΏΠ΅Ρ€Π΅Ρ€Π²Π½Ρ– Ρ–Π½Π½ΠΎΠ²Π°Ρ†Ρ–Ρ— Ρ‚Π° Π½Π΅ΠΎΡ‡Π΅Π²ΠΈΠ΄Π½Ρ– Ρ…ΠΎΠ΄ΠΈ. Наш Ρ„Ρ€Π΅ΠΉΠΌΠ²ΠΎΡ€ΠΊ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ β€” тСстувати Π½ΠΎΠ²Ρ– Π³Ρ–ΠΏΠΎΡ‚Π΅Π·ΠΈ, ΠΏΡƒΡˆΠΈΡ‚ΠΈ свої Ρ–Π΄Π΅Ρ— Ρ‚Π° Π²ΠΈΠΊΠΎΡ€ΠΈΡΡ‚ΠΎΠ²ΡƒΠ²Π°Ρ‚ΠΈ останній стСк Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ.

    ΠŸΡ€ΠΈΡ”Π΄Π½ΡƒΠΉΡΡ Π΄ΠΎ нас Ρƒ Ρ€ΠΎΠ»Ρ– Corporate Security Lead Π² ΠšΠΈΡ”Π²Ρ–

    Π©ΠΎ ΠΌΠΈ ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”ΠΌΠΎ самС для Ρ†Ρ–Ρ”Ρ— Ρ€ΠΎΠ»Ρ–:

    β€’ ΠΏΠΎΠ²Π½Ρƒ Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π°Π»ΡŒΠ½Ρ–ΡΡ‚ΡŒ Π·Π° ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Ρƒ Π±Π΅Π·ΠΏΠ΅ΠΊΡƒ β€” ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ самостійно ΠΊΠ΅Ρ€ΡƒΠ²Π°Ρ‚ΠΈ процСсами Ρ‚Π° Π²ΠΏΡ€ΠΎΠ²Π°Π΄ΠΆΡƒΠ²Π°Ρ‚ΠΈ Π΅Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½Ρ– стратСгії захисту
    β€’ ΡΠΏΡ–Π²ΠΏΡ€Π°Ρ†ΡŽ Π· Ρ‚ΠΎΠΏΠΎΠ²ΠΈΠΌΠΈ СкспСртами β€” ΠΎΠ±ΠΌΡ–Π½ знаннями Ρ‚Π° Π΄ΠΎΡΠ²Ρ–Π΄ΠΎΠΌ Π· Ρ„ахівцями Ρƒ ΡΡ„Π΅Ρ€Ρ– ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ доступ Π΄ΠΎ Π·ΠΎΠ²Π½Ρ–ΡˆΠ½Ρ–Ρ… рСсурсів β€” ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ Π·Π°Π»ΡƒΡ‡Π°Ρ‚ΠΈ консалтингову ΠΊΠΎΠΌΠΏΠ°Π½Ρ–ΡŽ для підсилСння Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²ΠΈΡ… Ρ–Π½Ρ–Ρ†Ρ–Π°Ρ‚ΠΈΠ²
    β€’ ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡŽΠ²Π°Ρ‚ΠΈ систСму Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π΄ΠΎΠ΄Π°ΡŽΡ‡ΠΈ Ρ‚Π° Π½Π°Π»Π°ΡˆΡ‚ΠΎΠ²ΡƒΡŽΡ‡ΠΈ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒΠ½Ρ– Ρ‚ΠΎΡ‡ΠΊΠΈ для Π΅Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³Ρƒ Ρ‚Π° ΡƒΠΏΡ€Π°Π²Π»Ρ–ння Ρ€ΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ
    β€’ сучасні ΠΏΡ–Π΄Ρ…ΠΎΠ΄ΠΈ Π΄ΠΎ ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ процСсів
    β€’ рСгулярний performance & salary review
    β€’ ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Ρƒ ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ—, Π² якій ΠΊΠΎΠΆΠ΅Π½ Ρ” Π·Π½Π°Ρ‡ΡƒΡ‰ΠΈΠΌ Ρ– Ρ†Ρ–Π½Π½ΠΈΠΌ Ρ‚Π° ΠΌΠ°Ρ” Π²ΠΏΠ»ΠΈΠ² Π½Π° процСси

    Π―ΠΊ ΡΠ°ΠΌΠ΅ Ρ‚ΠΈ ΠΌΠΎΠΆΠ΅Ρˆ Π²ΠΏΠ»ΠΈΠ²Π°Ρ‚ΠΈ Π½Π° Ρ€ΠΎΠ·Π²ΠΈΡ‚ΠΎΠΊ ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ—:

    β€’ формування Ρ‚Π° Π²ΠΏΡ€ΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ комплСксної стратСгії Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ– ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΡ–Π² ESRM
    β€’ Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° Ρ‚Π° Π°ΠΊΡ‚уалізація ΠΊΠ°Ρ€Ρ‚ΠΈ Ρ€ΠΈΠ·ΠΈΠΊΡ–Π² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠΏΡ–Π»ΡŒΠ½ΠΎ Π· ΠΊΠ΅Ρ€Ρ–Π²Π½ΠΈΠΊΠ°ΠΌΠΈ ΠΏΡ–Π΄Ρ€ΠΎΠ·Π΄Ρ–Π»Ρ–Π²
    β€’ рСалізація ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊ, стандартів Ρ– ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€ Π· ΡƒΠΏΡ€Π°Π²Π»Ρ–ння Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΎΡŽ, Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½ΠΎΡŽ Ρ‚Π° Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡŽ бСзпСкою
    β€’ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒ дотримання стандартів Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, впровадТСння ΠΌΠ΅Ρ…Π°Π½Ρ–Π·ΠΌΡ–Π² Π²Π½ΡƒΡ‚Ρ€Ρ–ΡˆΠ½ΡŒΠΎΠ³ΠΎ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŽ
    β€’ виявлСння, попСрСдТСння Ρ‚Π° Ρ€Π΅Π°Π³ΡƒΠ²Π°Π½Π½Ρ Π½Π° Π·Π°Π³Ρ€ΠΎΠ·ΠΈ для Π°ΠΊΡ‚ΠΈΠ²Ρ–Π² ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ— Ρ‚Π° ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»Ρƒ
    β€’ Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° ΠΏΠ»Π°Π½Ρ–Π² ΠΊΡ€ΠΈΠ·ΠΎΠ²ΠΎΠ³ΠΎ рСагування Π½Π° Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚ΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ‚Π° ΠΎΡ€Π³Π°Π½Ρ–зація Π°Π½Ρ‚ΠΈΠΊΡ€ΠΈΠ·ΠΎΠ²ΠΎΡ— Π³Ρ€ΡƒΠΏΠΈ
    β€’ управління ΡΠΈΡΡ‚Π΅ΠΌΠΎΡŽ Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ— (ΠΎΡ…ΠΎΡ€ΠΎΠ½Π°, Ρ–Π½ΠΆΠ΅Π½Π΅Ρ€Π½ΠΎ-Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½Ρ– засоби, Π²Π½ΡƒΡ‚Ρ€Ρ–ΡˆΠ½Ρ– ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€ΠΈ, Π±Π΅Π·ΠΏΠ΅ΠΊΠ° пСрсоналу Ρ‚ΠΎΡ‰ΠΎ)
    β€’ ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³ Ρ‚Π° ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒ Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (протидія ΡˆΠ°Ρ…Ρ€Π°ΠΉΡΡ‚Π²Ρƒ, ΠΊΡ€Π°Π΄Ρ–ΠΆΠΊΠ°ΠΌ, ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΈΠΌ Π·Π»ΠΎΡ‡ΠΈΠ½Π°ΠΌ Ρ‚ΠΎΡ‰ΠΎ)
    β€’ організація Ρ‚Π° ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒ Π·Π°Ρ…ΠΎΠ΄Ρ–Π² Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, захист ΠΊΠΎΠ½Ρ„Ρ–Π΄Π΅Π½Ρ†Ρ–ΠΉΠ½ΠΈΡ… Π΄Π°Π½ΠΈΡ…
    β€’ організація Ρ‚Π° ΠΏΡ€ΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²Ρ‡Π°Π½ΡŒ, інструктаТів Ρ‚Π° ΠΏΡ–двищСння рівня обізнаності пСрсоналу Π· ΠΏΠΈΡ‚Π°Π½ΡŒ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ взаємодія Π· ΠΏΡ€Π°Π²ΠΎΠΎΡ…ΠΎΡ€ΠΎΠ½Π½ΠΈΠΌΠΈ ΠΎΡ€Π³Π°Π½Π°ΠΌΠΈ, ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŽΡŽΡ‡ΠΈΠΌΠΈ структурами Ρ‚Π° ΠΏΠ°Ρ€Ρ‚Π½Π΅Ρ€Π°ΠΌΠΈ Ρƒ ΡΡ„Π΅Ρ€Ρ– Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎ-Π°Π½Π°Π»Ρ–Ρ‚ΠΈΡ‡Π½Π΅ забСзпСчСння ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ— Π·Π° Π½Π°ΠΏΡ€ΡΠΌΠΊΠΎΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ бСзпосСрСдня ΡƒΡ‡Π°ΡΡ‚ΡŒ Ρƒ Ρ€ΠΎΠ·Π±ΡƒΠ΄ΠΎΠ²Ρ– систСми ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ бізнСсу

    Π§Π΅Π»Π΅Π½Π΄ΠΆΡ– Π½Π° 6 ΠΌΡ–сяців:
    β€’ ознайомлСння Ρ‚Π° Π²ΠΈΠ²Ρ‡Π΅Π½Π½Ρ основних бізнСс-процСсів
    β€’ Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊΠΈ Ρ‚Π° ΡΡ‚Ρ€Π°Ρ‚Π΅Π³Ρ–Ρ— ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π·Π° Π½Π°ΠΏΡ€ΡΠΌΠΊΠ°ΠΌΠΈ: Ρ„Ρ–Π·ΠΈΡ‡Π½Π°, Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½Π° Ρ‚Π° ΠΊΠ°Π΄Ρ€ΠΎΠ²Π° Π±Π΅Π·ΠΏΠ΅ΠΊΠ°)
    β€’ затвСрдТСння ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊΠΈ Ρ‚Π° стратСгії ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π· ΠΊΠ΅Ρ€Ρ–Π²Π½ΠΈΠΊΠΎΠΌ

    Для досягнСння Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ–Π², Ρ‚ΠΎΠ±Ρ– Π·Π½Π°Π΄ΠΎΠ±Π»ΡΡ‚ΡŒΡΡ:

    β€’ Π²ΠΈΡ‰Π° освіта (ΡŽΡ€ΠΈΠ΄ΠΈΡ‡Π½Π°, Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½Π°, Π°Π±ΠΎ Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½Π°)
    β€’ досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π²Ρ–Π΄ 5 Ρ€ΠΎΠΊΡ–Π² Π½Π° ΠΊΠ΅Ρ€Ρ–Π²Π½ΠΈΡ… посадах Π² ΡƒΠΏΡ€Π°Π²Π»Ρ–Π½Π½Ρ– Ρ€ΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ Π³Π»ΠΈΠ±ΠΎΠΊΠ΅ розуміння стандартів Ρ‚Π° Ρ€Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°Ρ†Ρ–ΠΉ ASIS International Ρ‚Π° Ρ—Ρ… Π·Π°ΡΡ‚осування Ρƒ ΡΡ„Π΅Ρ€Ρ– ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ ΠΏΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½ΠΈΠΉ досвід впровадТСння Enterprise Security Risk Management (ESRM)
    β€’ знання законодавства Π£ΠΊΡ€Π°Ρ—Π½ΠΈ, Π·ΠΎΠΊΡ€Π΅ΠΌΠ° Π² Π³Π°Π»ΡƒΠ·Ρ–, Π΄ΠΎΡ‚ΠΈΡ‡Π½Ρ–ΠΉ Π΄ΠΎ Ρ„ΡƒΠ½ΠΊΡ†Ρ–ΠΉ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ Π·Π΄Π°Ρ‚Π½Ρ–ΡΡ‚ΡŒ Ρ‚Π° Π΄ΠΎΡΠ²Ρ–Π΄ ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ комплСксної систСми Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Ρ„Ρ–Π·ΠΈΡ‡Π½ΠΎΡ—, Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½ΠΎΡ—, Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ—)
    β€’ Π½Π°Π²ΠΈΡ‡ΠΊΠΈ Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠΈ Ρ‚Π° Ρ€Π΅Π°Π»Ρ–Π·Π°Ρ†Ρ–Ρ— стратСгій захисту Π°ΠΊΡ‚ΠΈΠ²Ρ–Π², ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ»ΠΎΠ³Ρ–ΠΉ управління Ρ€ΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Ρ‚Π° Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Π°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ досвід написання Ρ‚Π° Π²ΠΏΡ€ΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊ, стратСгій Ρ– ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    β€’ досвід Π²Π·Π°Ρ”ΠΌΠΎΠ΄Ρ–Ρ— Π· Π΄Π΅Ρ€ΠΆΠ°Π²Π½ΠΈΠΌΠΈ структурами, ΠΏΡ€Π°Π²ΠΎΠΎΡ…ΠΎΡ€ΠΎΠ½Π½ΠΈΠΌΠΈ ΠΎΡ€Π³Π°Π½Π°ΠΌΠΈ Ρ‚Π° ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŽΡŽΡ‡ΠΈΠΌΠΈ інституціями
    β€’ знання сучасних Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ забСзпСчСння Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (відСоспостСрСТСння, систСми ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŽ доступу, ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠ° Ρ‚ΠΎΡ‰ΠΎ)
    β€’ Π½Π°ΡΠ²Π½Ρ–ΡΡ‚ΡŒ сСртифікатів ASIS International (Ρƒ ΡΡ„Π΅Ρ€Ρ– ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ‚Π° ΡƒΠΏΡ€Π°Π²Π»Ρ–ння Ρ€ΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ), ΠΠŸΠšΠ‘ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ
    β€’ досвід провСдСння ΠΎΡ†Ρ–Π½ΠΊΠΈ Ρ€ΠΈΠ·ΠΈΠΊΡ–Π² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ підприємства
    β€’ знання Π°Π½Π³Π»Ρ–ΠΉΡΡŒΠΊΠΎΡ— ΠΌΠΎΠ²ΠΈ Π½Π° Ρ€Ρ–Π²Π½Ρ– Π²Ρ–Π΄ Intermediate

    Π―ΠΊ Ρ‚ΠΈ Ρ€Π΅Π³ΡƒΠ»ΡŽΡ”Ρˆ свій Ρ€ΠΎΠ±ΠΎΡ‡ΠΈΠΉ час?
    β€’ Π³Π½ΡƒΡ‡ΠΊΠΈΠΉ Π³Ρ€Π°Ρ„Ρ–ΠΊ Π· ΠΎΠ±ΠΎΠ²β€™ΡΠ·ΠΊΠΎΠ²ΠΈΠΌΠΈ ΡΠΏΡ–Π»ΡŒΠ½ΠΈΠΌΠΈ Π³ΠΎΠ΄ΠΈΠ½Π°ΠΌΠΈ співпраці Π· 11:00 Π΄ΠΎ 16:00
    β€’ days off Π·Ρ– збСрСТСнням Π²ΠΈΠ½Π°Π³ΠΎΡ€ΠΎΠ΄ΠΈ: 20 Π½Π° особисті ΠΏΠΎΡ‚Ρ€Π΅Π±ΠΈ, Ρ‰Π΅ 1 Π· Π½Π°Π³ΠΎΠ΄ΠΈ дня народТСння, 10 Ρ‡Π΅Ρ€Π΅Π· Ρ…Π²ΠΎΡ€ΠΎΠ±Ρƒ, Π΄ΠΎ 8-ΠΌΠΈ Π·Π° Π΄ΠΎΠ½Π°Ρ†Ρ–ΡŽ ΠΊΡ€ΠΎΠ²Ρ–

    Π―ΠΊ Ρ‚ΠΈ Π±ΡƒΠ΄Π΅Ρˆ ΠΏΡ€ΠΎΠΊΠ°Ρ‡ΡƒΠ²Π°Ρ‚ΠΈ свої скіли Π² Uklon?
    β€’ Π²Π½ΡƒΡ‚Ρ€Ρ–ΡˆΠ½Ρ–ΠΉ ΠΎΠ±ΠΌΡ–Π½ знаннями, ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΈ мСнторства Ρ‚Π° Ρ‚Ρ€Π΅Π½Ρ–Π½Π³ΠΈ Π· Ρ€ΠΎΠ·Π²ΠΈΡ‚ΠΊΡƒ soft Ρ‚Π° hard skills
    β€’ отримання ΠΏΡ€ΠΎΡ„Ρ–Π»ΡŒΠ½ΠΈΡ… сСртифікацій для СкспСртів
    β€’ ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Π° Π±Ρ–Π±Π»Ρ–ΠΎΡ‚Π΅ΠΊΠ° Ρ‚Π° ΠΏΡ–дписки Π½Π° Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½Ρ– рСсурси
    β€’ ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»ΡŒΠ½ΠΈΠΉ/ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΈΠΉ Π±ΡŽΠ΄ΠΆΠ΅Ρ‚ Π½Π° Π½Π°Π²Ρ‡Π°Π½Π½Ρ
    β€’ компСнсація English lessons Π· Π²Ρ–Π΄ΠΎΠΌΠΈΠΌΠΈ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π°ΠΌΠΈ

    Care and support:
    β€’ ΠΌΠ΅Π΄ΠΈΡ‡Π½Π΅ страхування Π² Π£ΠΊΡ€Π°Ρ—Π½Ρ–
    β€’ сСсії Π· ΠΏΡΠΈΡ…ΠΎΠ»ΠΎΠ³ΠΎΠΌ
    β€’ збСрСТСння 100% компСнсації Π½Π°ΡˆΠΈΡ… захисників
    β€’ забСзпСчСння своїх Π±Ρ–ΠΉΡ†Ρ–Π² Π² Π—Π‘Π£ Π°ΠΌΡƒΠ½Ρ–Ρ†Ρ–Ρ”ΡŽ Ρ‚Π° ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½Ρ‚Π°ΠΌΠΈ
    β€’ Π³Π΅ΠΉΠΌΡ–Ρ„Ρ–ΠΊΠ°Ρ†Ρ–Ρ—, ΠΏΠΎΠ΄Π°Ρ€ΡƒΠ½ΠΊΠΈ Ρ‚Π° Ρ€ΠΎΠ·Ρ–Π³Ρ€Π°ΡˆΡ–
    β€’ спортивні Π·Π°Ρ…ΠΎΠ΄ΠΈ Ρ‚Π° ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Ρ– Ρ‚Ρ–ΠΌΠ±Ρ–Π»Π΄Ρ–Π½Π³ΠΈ
    β€’ ΠΏΡ€ΠΎΠΌΠΎΠΊΠΎΠ΄ΠΈ Π½Π° ΠΏΠΎΡ—Π·Π΄ΠΊΠΈ Π· Uklon

    Regular Sport Activities:
    β€’ Uklon Football щотиТня
    β€’ Uklon Online Yoga щотиТня
    β€’ ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Ρ– Π·Π½ΠΈΠΆΠΊΠΈ, часткова компСнсація Π·Π°Π½ΡΡ‚ΡŒ спортом

    Corporate social responsibility
    Π©Π΅ Π· 2014 Ρ€ΠΎΠΊΡƒ Uklon Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎ ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΡƒΡ” ΡƒΠΊΡ€Π°Ρ—Π½ΡΡŒΠΊΡƒ Π°Ρ€ΠΌΡ–ΡŽ Ρ‚Π° Π²ΠΎΠ»ΠΎΠ½Ρ‚Π΅Ρ€ΡΡŒΠΊΡƒ ΡΠΏΡ–Π»ΡŒΠ½ΠΎΡ‚Ρƒ, Ρ” ΠΏΠΎΡΡ‚Ρ–ΠΉΠ½ΠΈΠΌ ΠΏΠ°Ρ€Ρ‚Π½Π΅Ρ€ΠΎΠΌ Π‘Π€ <ΠŸΠΎΠ²Π΅Ρ€Π½ΠΈΡΡŒ ΠΆΠΈΠ²ΠΈΠΌ>, Π° Π· 2022 Ρ€ΠΎΠΊΡƒ Π½Π°Π΄Π°Ρ” щомісячну фінансову ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΠΊΡƒ <Π€ΠΎΠ½Π΄Ρƒ БСргія ΠŸΡ€ΠΈΡ‚ΡƒΠ»ΠΈ>. Π’Π°ΠΊΠΎΠΆ компанія рСгулярно ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΡƒΡ” Ρ‚Π° ΠΎΡ€Π³Π°Π½Ρ–Π·ΠΎΠ²ΡƒΡ” Π·Π±ΠΎΡ€ΠΈ, наш фокус β€” Π΄Ρ€ΠΎΠ½ΠΈ, Π°Π±ΠΈ воювали Π²ΠΎΠ½ΠΈ, Π° Π½Π΅ Π»ΡŽΠ΄ΠΈ.
    А Ρ‰ΠΎΠ± Π·Π°Π»ΡƒΡ‡ΠΈΡ‚ΠΈ Π΄ΠΎ благодійності ΡΠΏΡ–Π»ΡŒΠ½ΠΎΡ‚Ρƒ Ρ€Π°ΠΉΠ΄Π΅Ρ€Ρ–Π² Uklon, Ρƒ застосунок Π΄ΠΎΠ΄Π°Π»ΠΈ Ρ„ΡƒΠ½ΠΊΡ†Ρ–Ρ— Ρ€Π°Π·ΠΎΠ²ΠΎΠ³ΠΎ Ρ‚Π° рСгулярного Π΄ΠΎΠ½Π°Ρ‚Ρƒ.

    Π―ΠΊΡ‰ΠΎ Ρ‚ΠΈ ΡˆΡƒΠΊΠ°Ρ”Ρˆ Π΄Ρ€Π°ΠΉΠ²ΠΎΠ²Ρƒ Ρ‚Π° Π°ΠΌΠ±Ρ–Ρ†Ρ–ΠΉΠ½Ρƒ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ²Ρƒ ΠΊΠΎΠΌΠΏΠ°Π½Ρ–ΡŽ, ΠΎΡ€Ρ–Ρ”Π½Ρ‚ΠΎΠ²Π°Π½Ρƒ Π½Π° Ρ€ΠΎΠ·Π²ΠΈΡ‚ΠΎΠΊ Ρ‚Π° світову Π΅ΠΊΡΠΏΠ°Π½ΡΡ–ΡŽ, Π·Π°Ρ†Ρ–ΠΊΠ°Π²Π»Π΅Π½ΠΈΠΉ Ρƒ використанні Π½ΠΎΠ²Ρ–Ρ‚Π½Ρ–Ρ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ Ρ‚Π° Π³ΠΎΡ‚ΠΎΠ²ΠΈΠΉ Π΄Π°Π»Ρ– ΠΏΡ–Π΄Π²ΠΈΡ‰ΡƒΠ²Π°Ρ‚ΠΈ свою СкспСртизу, приєднуйся Π΄ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ Uklon.

    ΠŸΠ΅Ρ€Π΅Π΄ поданням заявки Π½Π° Π²Ρ–Π΄ΠΊΡ€ΠΈΡ‚Ρƒ ΠΏΠΎΠ·ΠΈΡ†Ρ–ΡŽ Π² Uklon, Π±ΡƒΠ΄ΡŒ ласка, ознайомтСся Π· Π£ΠΌΠΎΠ²Π°ΠΌΠΈ ΠΎΠ±Ρ€ΠΎΠ±ΠΊΠΈ Ρ‚Π° Π·Π°Ρ…исту ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»ΡŒΠ½ΠΈΡ… Π΄Π°Π½ΠΈΡ… ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ‚Ρ–Π². ΠΠ°Π΄ΡΠΈΠ»Π°ΡŽΡ‡ΠΈ Π½Π°ΠΌ свої ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»ΡŒΠ½Ρ– Π΄Π°Π½Ρ–, Π·ΠΎΠΊΡ€Π΅ΠΌΠ° Ρ‚Ρ–, Ρ‰ΠΎ ΠΌΡ–ΡΡ‚ΡΡ‚ΡŒΡΡ Ρƒ Π²Π°ΡˆΠΎΠΌΡƒ Ρ€Π΅Π·ΡŽΠΌΠ΅, Π²ΠΈ Π΄Π°Ρ”Ρ‚Π΅ Π·Π³ΠΎΠ΄Ρƒ Π½Π° ΠΎΠ±Ρ€ΠΎΠ±ΠΊΡƒ ΠΏΠ΅Ρ€ΡΠΎΠ½Π°Π»ΡŒΠ½ΠΈΡ… Π΄Π°Π½ΠΈΡ… Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π½ΠΎ Π΄ΠΎ Ρ†ΠΈΡ… Π£ΠΌΠΎΠ².
    More
  • Β· 9 views Β· 0 applications Β· 1d

    Cyber Security Lead

    Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· Intermediate Ukrainian Product πŸ‡ΊπŸ‡¦
    Ajax Systems β€” Ρ†Π΅ ΠΌΡ–ΠΆΠ½Π°Ρ€ΠΎΠ΄Π½Π° Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½Π° компанія, Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆΠΈΠΉ Π² Π„Π²Ρ€ΠΎΠΏΡ– Ρ€ΠΎΠ·Ρ€ΠΎΠ±Π½ΠΈΠΊ Ρ– Π²ΠΈΡ€ΠΎΠ±Π½ΠΈΠΊ систСм Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ajax Ρ–Π· моТливостями Ρ€ΠΎΠ·ΡƒΠΌΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠΌΡƒ. Π¦Π΅ Ρ†Ρ–Π»Π° СкосистСма Π·Ρ– 180 пристроїв, ΠΌΠΎΠ±Ρ–Π»ΡŒΠ½ΠΈΡ… Ρ– дСсктопних застосунків, сСрвСрної інфраструктури. КоТного...

    Ajax Systems β€” Ρ†Π΅ ΠΌΡ–ΠΆΠ½Π°Ρ€ΠΎΠ΄Π½Π° Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–Ρ‡Π½Π° компанія, Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆΠΈΠΉ Π² Π„Π²Ρ€ΠΎΠΏΡ– Ρ€ΠΎΠ·Ρ€ΠΎΠ±Π½ΠΈΠΊ Ρ– Π²ΠΈΡ€ΠΎΠ±Π½ΠΈΠΊ систСм Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ajax Ρ–Π· моТливостями Ρ€ΠΎΠ·ΡƒΠΌΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠΌΡƒ. Π¦Π΅ Ρ†Ρ–Π»Π° СкосистСма Π·Ρ– 180 пристроїв, ΠΌΠΎΠ±Ρ–Π»ΡŒΠ½ΠΈΡ… Ρ– дСсктопних застосунків, сСрвСрної інфраструктури. КоТного Ρ€ΠΎΠΊΡƒ ΠΌΠΈ дСмонструємо ΠΊΡ€Π°Ρ‚Π½Π΅ зростання як Ρƒ Ρ‡ΠΈΡΠ΅Π»ΡŒΠ½ΠΎΡΡ‚Ρ– ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, Ρ‚Π°ΠΊ Ρ– Π² ΠΊΡ–Π»ΡŒΠΊΠΎΡΡ‚Ρ– користувачів Ρƒ Π²ΡΡŒΠΎΠΌΡƒ світі. Наразі Π² ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ— Π±Ρ–Π»ΡŒΡˆΠ΅ 4 100 ΠΏΡ€Π°Ρ†Ρ–Π²Π½ΠΈΠΊΡ–Π². А Π΄Π°Ρ‚Ρ‡ΠΈΠΊΠΈ Ajax ΠΎΡ…ΠΎΡ€ΠΎΠ½ΡΡŽΡ‚ΡŒ 3,5 ΠΌΠ»Π½ користувачів Ρƒ Π±Ρ–Π»ΡŒΡˆ Π½Ρ–ΠΆ 187 ΠΊΡ€Π°Ρ—Π½Π°Ρ… світу.

    Ajax Systems ΠΌΠ°Ρ” Π²ΠΈΡ€ΠΎΠ±Π½ΠΈΡ†Ρ‚Π²ΠΎ ΠΏΠΎΠ²Π½ΠΎΠ³ΠΎ Ρ†ΠΈΠΊΠ»Ρƒ: Π²Ρ–Π΄ Π³Π΅Π½Π΅Ρ€Π°Ρ†Ρ–Ρ— Ρ–Π΄Π΅ΠΉ Ρ‚Π° створСння ΠΏΡ€ΠΎΡ‚ΠΎΡ‚ΠΈΠΏΡ–Π² Π΄ΠΎ масового Π²ΠΈΡ€ΠΎΠ±Π½ΠΈΡ†Ρ‚Π²Π° Ρ‚Π° ΠΏΡ€ΠΎΠ΄Π°ΠΆΡƒ ΠΏΠΎ Π²ΡΡŒΠΎΠΌΡƒ світу. КоТСн Π΄Π΅ΠΏΠ°Ρ€Ρ‚Π°ΠΌΠ΅Π½Ρ‚ Π·Π°ΠΊΡ€ΠΈΠ²Π°Ρ” ΠΏΠ΅Π²Π½Ρƒ ΠΎΠΏΠ΅Ρ€Π°Ρ†Ρ–ΠΉΠ½Ρƒ ΠΏΠΎΡ‚Ρ€Π΅Π±Ρƒ бізнСсу Π² ΠΏΠΎΠ²Π½Ρ–ΠΉ ΠΌΡ–Ρ€Ρ–. Π€Π°Ρ…Ρ–Π²Ρ†Ρ– ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ— Π·Π°Π»ΡƒΡ‡Π΅Π½Ρ– Π½Π° всіх Π΅Ρ‚Π°ΠΏΠ°Ρ…: Π²Ρ–Π΄ Π²ΠΈΡ€ΠΎΠ±Π½ΠΈΡ‡ΠΎΡ— Π»Ρ–Π½Ρ–Ρ— Π² Π£ΠΊΡ€Π°Ρ—Π½Ρ– Π΄ΠΎ логістичного Ρ†Π΅Π½Ρ‚Ρ€Ρƒ Π² ΠŸΠΎΠ»ΡŒΡ‰Ρ–, Π·Π²Ρ–Π΄ΠΊΠΈ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ†Ρ–ΡŽ Π²Ρ–Π΄ΠΏΡ€Π°Π²Π»ΡΡŽΡ‚ΡŒ Π΄ΠΈΡΡ‚Ρ€ΠΈΠ±ΚΌΡŽΡ‚ΠΎΡ€Π°ΠΌ ΠΏΠΎ Π²ΡΡŒΠΎΠΌΡƒ світу.

     

    Ми Π½Π°Ρ€Π°Π·Ρ– ΡˆΡƒΠΊΠ°Ρ”ΠΌΠΎ досвідчСного Π»Ρ–Π΄Π΅Ρ€Π° Π² сфСрі ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, який Π±ΡƒΠ΄Π΅ управляти командою Ρ„Π°Ρ…Ρ–Π²Ρ†Ρ–Π², Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ Π½Π°ΠΌ Π±ΡƒΠ΄ΡƒΠ²Π°Ρ‚ΠΈ Ρ‚Π° Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡŽΠ²Π°Ρ‚ΠΈ захист Π½Π°ΡˆΠΈΡ… систСм, Π΄Π°Π½ΠΈΡ… Ρ– користувачів. Π―ΠΊΡ‰ΠΎ Π²ΠΈ ΠΌΠ°Ρ”Ρ‚Π΅ стратСгічнС бачСння Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Ρ€ΠΎΠ·ΡƒΠΌΡ–Ρ”Ρ‚Π΅ Π°ΠΊΡ‚ΡƒΠ°Π»ΡŒΠ½Ρ– Π·Π°Π³Ρ€ΠΎΠ·ΠΈ Ρ‚Π° Π³ΠΎΡ‚ΠΎΠ²Ρ– Π²ΠΏΡ€ΠΎΠ²Π°Π΄ΠΆΡƒΠ²Π°Ρ‚ΠΈ Π½Π°ΠΉΠΊΡ€Π°Ρ‰Ρ– ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΈ кібСрзахисту β€” Π±ΡƒΠ΄Π΅ΠΌΠΎ Ρ€Π°Π΄Ρ– Π±Π°Ρ‡ΠΈΡ‚ΠΈ вас Ρƒ Π½Π°ΡˆΡ–ΠΉ ΠΊΠΎΠΌΠ°Π½Π΄Ρ–!

     

    Π’ΠΈΠΌΠΎΠ³ΠΈ: 

    Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Ρƒ сфСрі ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²Ρ–Π΄ 5 Ρ€ΠΎΠΊΡ–Π², Π· яких Ρ‰ΠΎΠ½Π°ΠΉΠΌΠ΅Π½ΡˆΠ΅ 2 Ρ€ΠΎΠΊΠΈ Π½Π° ΠΊΠ΅Ρ€Ρ–Π²Π½ΠΈΡ… Π°Π±ΠΎ Π»Ρ–Π΄Π΅Ρ€ΡΡŒΠΊΠΈΡ… позиціях.

    Досвід управління командою спСціалістів Π· Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

    Π“Π»ΠΈΠ±ΠΎΠΊΠ΅ розуміння ΠΊΠΎΠ½Ρ†Π΅ΠΏΡ†Ρ–ΠΉ управління Ρ€ΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

    ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½ΠΈΠΉ досвід Ρƒ Π²ΠΏΡ€ΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ– Π·Π°Ρ…ΠΎΠ΄Ρ–Π² Π· ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡ€Π΅ΠΌΠ° Ρƒ Π²Π΅Π»ΠΈΠΊΠΈΡ… підприємствах.

    Знання Ρ‚Π° впровадТСння ΠΌΡ–ΠΆΠ½Π°Ρ€ΠΎΠ΄Π½ΠΈΡ… стандартів Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, SOC 2, GDPR, PCI DSS).

    Досвід участі Π² Π°ΡƒΠ΄ΠΈΡ‚Π°Ρ… Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‡ΠΈ ΠΏΡ–Π΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΡƒ Π΄ΠΎ сСртифікації.

    ВпровадТСння Ρ‚Π° управління Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Π°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM, SOAR, EDR, SOC).

    Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π· Ρ…ΠΌΠ°Ρ€Π½ΠΈΠΌΠΈ ΠΏΠ»Π°Ρ‚Ρ„ΠΎΡ€ΠΌΠ°ΠΌΠΈ (AWS, Azure, Google Cloud) Ρ‚Π° Ρ—Ρ…Π½Ρ–ΠΌΠΈ засобами Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

     

    ΠžΡ‡Ρ–ΠΊΡƒΠ²Π°Π½Π½Ρ Ρ‰ΠΎΠ΄ΠΎ Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½ΠΈΡ… Π½Π°Π²ΠΈΡ‡ΠΎΠΊ: 

    Π“Π»ΠΈΠ±ΠΎΠΊΠ΅ розуміння Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ ΠΌΠ΅Ρ€Π΅ΠΆΠ΅Π²ΠΈΡ… ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ–Π², ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„Ρ–Ρ—, Π°Ρ€Ρ…Ρ–Ρ‚Π΅ΠΊΡ‚ΡƒΡ€ΠΈ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
    Знання Ρ‚Π° досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π· (Ρ‰ΠΎΠ½Π°ΠΉΠΌΠ΅Π½ΡˆΠ΅ 1 інструмСнт Ρ–Π· Π±ΡƒΠ΄ΡŒ-якої ΠΊΠ°Ρ‚Π΅Π³ΠΎΡ€Ρ–Ρ—):

    Firewall: Cisco ASA, Palo Alto Networks, Check Point, Fortinet.

    MDM: Microsoft Intune, Jamf Pro, Kandji, VMware Workspace ONE, ManageEngine Endpoint Central.

    SIEM: Splunk, IBM QRadar, ArcSight.

    IDS/IPS: Snort, Suricata, Cisco Firepower.

    DLP: Symantec DLP, McAfee DLP, Digital Guardian.

    XDR/EDR: Crowdstrike Falcon, Carbon Black, SentinelOne.

    PUM/PAM: CyberArk, BeyondTrust, Thycotic.

    Досвід впровадТСння засобів захисту ΠΊΡ–Π½Ρ†Π΅Π²ΠΈΡ… пристроїв, ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŽ доступу, ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ….
    Навички провСдСння Ρ‚Π΅ΡΡ‚ΡƒΠ²Π°Π½ΡŒ Π½Π° проникнСння Ρ‚Π° Π°Π½Π°Π»Ρ–Π·Ρƒ вразливостСй

     

    Завдання: 

    Π ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° Ρ‚Π° впровадТСння стратСгії ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²Ρ–Π΄ΠΏΠΎΠ²Ρ–Π΄Π½ΠΎ Π΄ΠΎ бізнСс-Ρ†Ρ–Π»Π΅ΠΉ ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ—.

    Управління командою Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Ρ€ΠΎΠ·ΠΏΠΎΠ΄Ρ–Π» завдань Ρ‚Π° ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒ Ρ—Ρ… виконання.

    ВизначСння Ρ‚Π° впровадТСння ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊ Ρ– ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

    ΠžΡ†Ρ–Π½ΠΊΠ° Ρ€ΠΈΠ·ΠΈΠΊΡ–Π² ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ‚Π° Ρ€ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° Π·Π°Ρ…ΠΎΠ΄Ρ–Π² Ρ‰ΠΎΠ΄ΠΎ Ρ—Ρ… ΠΌΡ–Π½Ρ–ΠΌΡ–Π·Π°Ρ†Ρ–Ρ—.

    ΠšΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΡŒ Π·Π° впровадТСнням Ρ‚Π° оновлСнням систСм ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

    ΠžΡ€Π³Π°Π½Ρ–Π·Π°Ρ†Ρ–Ρ Ρ‚Π° кСрування Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Π°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, рСагування Π½Π° Π·Π°Π³Ρ€ΠΎΠ·ΠΈ Ρ‚Π° усунСння наслідків Π°Ρ‚Π°ΠΊ.

    ΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ навчання Ρ‚Π° підвищСння обізнаності пСрсоналу Ρ‰ΠΎΠ΄ΠΎ ΠΊΡ–Π±Π΅Ρ€Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

    Бпівпраця Π· Π²Π½ΡƒΡ‚Ρ€Ρ–ΡˆΠ½Ρ–ΠΌΠΈ Ρ‚Π° Π·ΠΎΠ²Π½Ρ–ΡˆΠ½Ρ–ΠΌΠΈ Π°ΡƒΠ΄ΠΈΡ‚ΠΎΡ€Π°ΠΌΠΈ, ΠΏΡ–Π΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΠ° Π΄ΠΎ сСртифікацій Ρ‚Π° ΠΏΠ΅Ρ€Π΅Π²Ρ–Ρ€ΠΎΠΊ.

    ВпровадТСння SIEM, SOC, інтСграція систСм ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³Ρƒ Π·Π°Π³Ρ€ΠΎΠ·.

    Π£Ρ‡Π°ΡΡ‚ΡŒ Ρƒ Ρ„ΠΎΡ€Π΅Π½Π·Ρ–ΠΊ розслідуваннях Ρ‚Π° Π°Π½Π°Π»Ρ–Π· Ρ–Π½Ρ†ΠΈΠ΄Π΅Π½Ρ‚Ρ–Π² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.

     

    Ми ΠΏΡ€ΠΎΠΏΠΎΠ½ΡƒΡ”ΠΌΠΎ: 

    Π ΠΎΠ±ΠΎΡ‚Ρƒ Π² ΠΊΠΎΠΌΡ„ΠΎΡ€Ρ‚Π°Π±Π΅Π»ΡŒΠ½ΠΎΠΌΡƒ офісі UNIT.City (ΠšΠΈΡ—Π²) Π°Π±ΠΎ Π’Π°Ρ€ΡˆΠ°Π²Π°. ΠžΡ„Ρ–Ρ ΠΎΠ±Π»Π°ΡˆΡ‚ΠΎΠ²Π°Π½ΠΈΠΉ Π³Π΅Π½Π΅Ρ€Π°Ρ‚ΠΎΡ€ΠΎΠΌ Ρ‚Π° Π±ΠΎΠΌΠ±ΠΎΡΡ…ΠΎΠ²ΠΈΡ‰Π΅ΠΌ.

    ΠžΡ„Ρ–Ρ†Ρ–ΠΉΠ½Π΅ ΠΏΡ€Π°Ρ†Π΅Π²Π»Π°ΡˆΡ‚ΡƒΠ²Π°Π½Π½Ρ Π·Ρ– ΡΡ‚Π°Π±Ρ–Π»ΡŒΠ½ΠΎΡŽ ΠΎΠΏΠ»Π°Ρ‚ΠΎΡŽ Ρ‚Π° Π²ΡΡ–ΠΌΠ° гарантіями Дія.City Ρ€Π΅Π·ΠΈΠ΄Π΅Π½Ρ‚Π°.

    Π“Π½ΡƒΡ‡ΠΊΠΈΠΉ Π³Ρ€Π°Ρ„Ρ–ΠΊ Π±Π΅Π· прив’язки Π΄ΠΎ Ρ€ΠΎΠ±ΠΎΡ‡ΠΈΡ… Π³ΠΎΠ΄ΠΈΠ½.

    Заняття Π°Π½Π³Π»Ρ–ΠΉΡΡŒΠΊΠΎΡŽ.

    ΠœΠ΅Π΄ΠΈΡ‡Π½Π΅ страхування.

    Π”Ρ€Π°ΠΉΠ²ΠΎΠ²Ρƒ ΠΊΠΎΠΌΠ°Π½Π΄Ρƒ Ρ‚Π° zero bullshit culture.

     

    More
  • Β· 22 views Β· 1 application Β· 1d

    Middle Anti-Fraud manager

    Full Remote Β· Worldwide Β· Product Β· 3 years of experience Β· Upper-Intermediate
    Responsibilities: Establish and lead the anti-fraud department, including recruiting, training, and managing a team of fraud analysts. Develop and implement robust processes for reviewing player activity before payouts, ensuring compliance with...
    • Responsibilities:
      Establish and lead the anti-fraud department, including recruiting, training, and managing a team of fraud analysts.
    • Develop and implement robust processes for reviewing player activity before payouts, ensuring compliance with established rules and policies.
    • Set up and optimize tools and systems to detect, analyze, and prevent fraudulent activity.
    • Collaborate with payment, compliance, and support teams to handle escalated cases and improve overall operational security.
    • Monitor player behavior and trends to identify potential fraud patterns and adjust preventive measures accordingly.
    • Define and track key performance indicators (KPIs) for the department to ensure efficiency and effectiveness.
    • Conduct regular audits and reviews of processes to identify areas for improvement and implement best practices.
    • Stay updated on industry trends, fraud tactics, and technological advancements to continuously enhance the department’s capabilities.
    • Provide regular reports on department performance, fraud incidents, and implemented solutions to stakeholders.
    • Establish and enforce clear rules and guidelines for payout approvals to minimize fraud risks.
       

    Required Skills:

    • Proven experience in building and managing anti-fraud teams, preferably in the iGaming.
    • Deep understanding of fraud prevention tools, systems, and best practices.
    • Analytical mindset with expertise in data analysis and pattern recognition to identify fraudulent activities.
    • Experience in implementing anti-fraud measures tailored to payouts and player activity reviews.
    • Knowledge of U.S. regulations and compliance requirements is an advantage.

      What We Offer:
    • The opportunity to build a department from the ground up and shape its future.
    • A collaborative and innovative work environment focused on growth and success.
    • Competitive salary.
    • The chance to make a significant impact on a high-profile project in a key market.




       

    More
  • Β· 7 views Β· 0 applications Β· 1d

    WEB Assessment Engineer

    Ukraine Β· Product Β· 3 years of experience Β· Intermediate
    Samsung R&D Institute Ukraine is looking for a passionate and collaborative WEB Security Assessment engineer to join our team. You will be involved in preventive security review and penetration testing of our online solutions in use by hundreds of...

    Samsung R&D Institute Ukraine is looking for a passionate and collaborative WEB Security Assessment engineer to join our team.

     

    You will be involved in preventive security review and penetration testing of our online solutions in use by hundreds of millions of users worldwide.

     

    If you love working directly on consumer-facing products we are glad to meet you at our team of professionals in Samsung R&D Institute Ukraine.

     

    More specifically you will:

    - perform vulnerability assessments of Samsung online services

    - make blackbox penetration testing of production WEB services and server infrastructure

    - make blackbox/greybox security validation of cloud infrastructure

    - make blackbox penetration testing of enterprise IT infrastructure

    - engage in emerging threats research: new attack methods, threat modelling, security bug hunting

     

    Major Requirements:

    - BlackBox and WhiteBox WEB pen.testing and vulnerability assessment experience

    - BlackBox pen.test experience of cloud infrastructures and services

    - OWASP Top-10: understanding of common Web Application vulnerabilities

    - DB: understanding of database operation (pref. PostgreSQL, MongoDB, MySQL, SQLite, MS SQL)

    - technical English (strong reporting skills, ability to communicate with colleagues worldwide)

     

    Optional Requirements:

    - security background (relevant University education, relevant prior employment, community activities, CTF participation)

    - cryptography: understanding of crypto primitives and protocols (SSL/TLS, authentication & authorization protocols, crypto algs.)

    - strong understanding of REST, SOAP operation

    - pen.test experience of solutions hosted on popular cloud platforms (Alibaba, GCP, Azure, AWS)

    - toolset: hands-on experience with Burp, scripting (Python), assessment automation tools (fuzz, scan)

    - network security: understanding of WAF, CDN, IPS/IDS operation and weaknesses

    - understanding of Devices-to-Cloud Services assessment principles

    - understanding of OSINT tools and techniques

     

    Working Conditions:

    - official employment - GIG contract

    - remote work is possible as well as work in Kyiv office

     

    Benefits:

    - competitive salary, annual salary review, annual bonuses

    - paid 28 work days of annual vacations and sick leaves

    - opportunity to become an inventor of international patents with paid bonuses

    - medical & life insurance for employees and their children

    - paid lunches

    - discounts to Samsung products, services

    - regular education and self-development on internal courses and seminars

    - hybrid work format, working in office is required for some tasks

    More
  • Β· 6 views Β· 0 applications Β· 1d

    Software Penetration Tester

    Ukraine Β· Product Β· 3 years of experience Β· Intermediate
    Vulnerability assessment and penetration testing of various Linux OS security components and mechanisms: - vulnerability assessment of Samsung mobile security software: security source code review (white box) and binary analysis (black box) - secure...

    Vulnerability assessment and penetration testing of various Linux OS security components and mechanisms:

     

    - vulnerability assessment of Samsung mobile security software: security source code review (white box) and binary analysis (black box)

    - secure SDLC process support (including requirements, design security review)

    - emerging threats research: new attack methods, (un)known security issues risks

     

    Major Requirements:

    - 2+ years of hands-on experience with white and black box software penetration testing and vulnerability assessment

    - understanding of typical software security issues (memory corruptions, various injections, arithmetic overflows, etc.) and how to protect against them

    - good experience with C/C++, scripting languages, assembly (Arm preferred)

    - ability to document and describe discovered security issues

     

    Optional Requirements:

    - exploitation experience

    - understanding of Linux security architecture and design flaws exploitation (privilege escalation, MAC/DAC Passover oth.).

    - Rust language knowledge

    - tools: experience with fuzzers, disassemblers, debuggers, assessment automation tools

    - cryptography: exploitation experience (weak keys, bruteforce, weak crypto, etc.)

    - experience with assessing protected solutions (obfuscated / packed code)

     

    Working Conditions:

    - official employment - GIG contract

    - remote work is possible as well as work in Kyiv office

     

    Benefits:

    - competitive salary, annual salary review, annual bonuses

    - paid 28 work days of annual vacations and sick leaves

    - opportunity to become an inventor of international patents with paid bonuses

    - medical & life insurance for employees and their children

    - paid lunches

    - discounts to Samsung products, services

    - regular education and self-development on internal courses and seminars

    - hybrid work format, working in office is required for some tasks

    More
  • Β· 11 views Β· 2 applications Β· 1d

    Senior information security engineer to $5000

    Office Work Β· Ukraine (Kyiv) Β· 3 years of experience
    Π’ΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ‚Ρ–Π²: Π’ΠΈΡ‰Π° Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½Π° освіта Π°Π±ΠΎ закінчСння спСціалізованих курсів Ρƒ сфСрі Π†Π‘ Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π²Ρ–Π΄ 3 Ρ€ΠΎΠΊΡ–Π² Π² Π³Π°Π»ΡƒΠ·Ρ– забСзпСчСння Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½ΠΈΠΉ досвід (проСктування/впровадТСння) Industrial Cyber Security Solutions Знання...

    Π’ΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ‚Ρ–Π²:

    • Π’ΠΈΡ‰Π° Ρ‚Π΅Ρ…Π½Ρ–Ρ‡Π½Π° освіта Π°Π±ΠΎ закінчСння спСціалізованих курсів Ρƒ сфСрі Π†Π‘
    • Досвід Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π²Ρ–Π΄ 3 Ρ€ΠΎΠΊΡ–Π² Π² Π³Π°Π»ΡƒΠ·Ρ– забСзпСчСння Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    • ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π½ΠΈΠΉ досвід (проСктування/впровадТСння) Industrial Cyber Security Solutions
    • Знання інструмСнтів Ρ– Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ IT-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‡ΠΈ SIEM, VPN, Firewall Ρ‚Π° ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΈ ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ
    • Π“Π»ΠΈΠ±ΠΎΠΊΠ΅ розуміння Ρ„Ρ€Π΅ΠΉΠΌΠ²ΠΎΡ€ΠΊΡ–Π² Ρ‚Π° стандартів Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, COBIT, CIT)
    • Навички Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ Π· антивірусами, DLP, IDM, FIM Ρ‚Π° PAM, IPS/IDS Ρ€Ρ–ΡˆΠ΅Π½Π½ΡΠΌΠΈ
    • Досвід управління рСсурсами Π‘Π£Π†Π‘ (asset management) Ρ‚Π° MDM систСмами

     

    Π‘Π΅Ρ€Ρ‚ΠΈΡ„Ρ–ΠΊΠ°Ρ†Ρ–Ρ— (Π±ΡƒΠ΄ΡƒΡ‚ΡŒ ΠΏΠ΅Ρ€Π΅Π²Π°Π³ΠΎΡŽ): CISSP, CISA, CISM, CEH, CHFI.

     

    ΠšΠ»ΡŽΡ‡ΠΎΠ²Ρ– завдання посади:

    • БтворСння Ρ– впровадТСння стандартів Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ для захисту ΠΊΠΎΠ½Ρ„Ρ–Π΄Π΅Π½Ρ†Ρ–ΠΉΠ½ΠΈΡ… Π΄Π°Π½ΠΈΡ… ΠΊΠΎΠΌΠΏΠ°Π½Ρ–Ρ— Ρ‚Π° ΠΊΠ»Ρ–Ρ”Π½Ρ‚Ρ–Π²
    • ВпровадТСння Ρ‚Π° адміністрування систСм Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM, IDS/IPS, DLP, MDM, Π°Π½Π°Π»Ρ–Ρ‚ΠΈΠΊΠ° Π»ΠΎΠ³Ρ–Π² Π½Π°ΠΏΡ€ - Wazuh, Surikata)
    • Управління ΠΊΡ–Π±Π΅Ρ€Ρ€ΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ. ΠŸΠΎΡˆΡƒΠΊ, виявлСння Ρ‚Π° ΠΎΠ±Ρ€ΠΎΠ±ΠΊΠ° вразливостСй Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… рСсурсів
    • ВпровадТСння сучасних ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„Ρ–Ρ‡Π½ΠΈΡ… Ρ€Ρ–ΡˆΠ΅Π½ΡŒ Ρ– ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ–Π² ΡˆΠΈΡ„Ρ€ΡƒΠ²Π°Π½Π½Ρ для захисту Π΄Π°Π½ΠΈΡ… 
    • ΠžΡ€Π³Π°Π½Ρ–Π·Π°Ρ†Ρ–Ρ рСгулярних Pentest ΠΏΠ΅Ρ€ΠΈΠΌΠ΅Ρ‚Ρ€Π°
    • БтворСння ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΠΊΠΈ IT-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    • Навчання пСрсоналу основам Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΎΡ— Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
    More
  • Β· 17 views Β· 1 application Β· 4d

    Active Directory Engineer – Identity and Access Management

    Full Remote Β· Countries of Europe or Ukraine Β· 8 years of experience Β· Intermediate
    Requirements: Bachelor's or Master's degree in Computer Science, Electrical Engineering, Information Systems, or a related field. 8+ years of development experience focused on identity and access management systems. Hands-on experience with programming...

    Requirements:

    • Bachelor's or Master's degree in Computer Science, Electrical Engineering, Information Systems, or a related field.
    • 8+ years of development experience focused on identity and access management systems.
    • Hands-on experience with programming languages and automation tools (C#, .NET, Ansible, Python, Java, Go, Node.js, Terraform, Docker, etc.).
    • Experience with Active Directory or similar systems.
    • Experience integrating with Microsoft Active Directory or comparable third-party systems.
    • Development experience in hybrid cloud environments.
    • Strong cross-functional communication skills for technical and non-technical audiences.
    • Experience working with multiple vendors in the identity and access management ecosystem.

    Nice-to-Have:

    • Familiarity with cloud security best practices and certificate infrastructure.
    • Experience with container orchestration and microservices architectures.
    • Knowledge of Single Sign-On (SSO), multi-factor authentication, and identity federation.
    • Experience with continuous integration/continuous deployment (CI/CD) pipelines.
    • Exposure to agile development methodologies and DevOps practices.

    Key Responsibilities:

    • Integrate identity data from corporate systems and enforce roles and policies to control access to critical resources.
    • Implement features such as JIT, JML, PIM, PAM, and RBAC.
    • Collaborate with security, compliance, and engineering teams to ensure proper logging and auditing of access activities.
    • Design, develop, and operate identity management systems across infrastructure in both private and public clouds.
    • Monitor industry trends and adopt new tools and features as needed.
    • Mentor junior engineers and participate in on-call rotations.

    About the Project:

    We are seeking an experienced Active Directory Engineer specializing in Identity and Access Management to enhance product infrastructure security. The role involves managing user identities, governing access to production systems, and automating security processes to ensure seamless and secure access management for engineers and operations personnel. The team collaborates cross-functionally to build scalable solutions that integrate with compliance and security requirements.

    More
  • Β· 28 views Β· 3 applications Β· 4d

    Information Security Consultant / Auditor

    Ukraine Β· Product Β· 5 years of experience Β· Upper-Intermediate
    This vacancy is only for Ukrainian residents within Ukraine. We invite an experienced Information Security Consultant / Auditor to join our team. This position might be a good fit if you want to analyse and improve information security processes in...

    This vacancy is only for Ukrainian residents within Ukraine.

     

    We invite an experienced Information Security Consultant / Auditor to join our team. This position might be a good fit if you want to analyse and improve information security processes in modern technological companies.

    As a company specialising in data security solutions, our products are well-known amongst security-aware teams worldwide and are popular for easily solving complicated security challenges. Apart from building β€œoff-the-shelf” solutions, we design custom security controls for novel problems and handle mission-critical, multi-app, multi-platform distributed systems, addressing serious issues in the world around us.

    We work in the B2B space with customers such as power grid operators, payment processors, legal companies, and million-user customer applications.

     

    Responsibilities:

    • Understand the cybersecurity posture of technological organisations and guide them towards improvements.
    • Conduct risk assessment and gap analysis for us and our clients: analyse risk posture, define sensitive assets, describe top risks & threats, identify gaps in security controls coverage, suggest missing controls and policies. Think NIST RMF, NIST SP 800-53.
    • Outline organisation-wide and product-wide security roadmaps and plans.
    • Lead cybersecurity programme (improving security posture) for our clients.
    • Select and insist on security controls that would mitigate high-priority risks (NIST SP 800-53).
    • Design and draft security policies, procedures, standards and controls in line with regulations and/or relevant standards. Think ISO27K, NIST CSF, SOC 2.
    • Maintain and review ISMS documentation, suggest improvements.
    • Maintain control documentation for relevant risk areas and business/technology processes.

     

    Requirements:

    • 5+ years of experience working as a risk & compliance auditor, information security officer, cybersecurity consultant, or in a similar role.
    • Sound understanding of industry standards in cybersecurity (NIST, ISO, ITIL, ISF).
    • Strong understanding of security and information security controls: which ones solve which problems.
    • Good understanding of industry standards in privacy (GDPR, ISO 27018).
    • Advanced knowledge of IT general controls (security, change management, disaster backup recovery, data centre, infrastructure, etc.) and IT governance processes (ITIL).
    • Bachelor’s or Master’s degree in Computer Science, Cybersecurity, IT Auditing, Information Systems.
    • Upper-intermediate English, written and spoken.
    • Ability to work independently and as part of a team in a fast-paced environment.

     

    Nice to have:

    • In-depth technical understanding of information security, IoT and hardware, systems engineering, infrastructure, etc.
    • Understanding of how large distributed systems are built or how they work. Think power plant control systems at country-scale.
    • Desire to work on extremely innovative projects.
    • Experience working in a multicultural context.

     

    Hiring Process:

    • Test task
    • Introduction call
    • Technical interview
    • Offer

     

    What’s in it for you?

    • Competitive compensation with bonuses
    • Hybrid work model: this position allows for a combination of in-office and remote work as needed
    • Paid vacation β€” 21 business days per year
    • Paid sick leave
    • Work at the intersection of cryptography, software engineering, and information security
    • Opportunity to contribute to mission-critical projects
    • Reimbursement for courses, certifications, and books
    More
  • Β· 31 views Β· 4 applications Β· 4d

    Information Security Manager

    Worldwide Β· 3 years of experience Β· Upper-Intermediate
    Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clients’ digital assets. Responsibilities: Implement security measures in alignment with industry frameworks. Conduct security...

    Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clients’ digital assets.

    Responsibilities:

    • Implement security measures in alignment with industry frameworks.
    • Conduct security assessments for client projects using established methodologies and provide actionable recommendations.
    • Collaborate with development teams to identify risks and implement the most efficient security solutions.
    • Promote security services by engaging with clients and presenting solutions.

    Requirements:

    • 3+ years of experience with security frameworks such as ISO 27001, SOC 2, or NIST CSF.
    • Knowledge of cloud security, with practical experience, is a plus.
    • Understanding of Secure SDLC and software security architecture is a plus.
    • Ability to engage clients and provide expert security consulting.
    • A structured approach to work and clear documentation skills.
    • Ability to automate tasks using any programming language and AI tools.
    • Upper-Intermediate English or higher.

    Our benefits:

    GROWTH & EDUCATION

    • Individual development plan.
    • Mentoring program.
    • Evaluation process.
    • Professional education.
    • Covering the cost of professional certifications.
    • Corporate library.
    • English classes.

    COMMUNITY

    • Technological community.
    • Volunteering & Charity.
    • Yalantis events.
    • Yalantis Education.
    • Project team building activities.

    WELLBEING

    • Medical insurance, health check-ups, and compensation for sports activities are up to you.
    • Vacation & Days Off.
    • Mental health support program.
    • Public holidays.
    • Financial and legal support for private entrepreneurs.

    WORK ENVIRONMENT

    • Cozy offices (Dnipro, Kyiv, Warsaw).
    • Corporate Top-notch equipment and quality tools.
    • Flexible format of work.
    • Eco & Pet-friendly space.
    • Fun activities in offices.
    • Y-bucks & Yalantis store.
    More
  • Β· 19 views Β· 0 applications Β· 4d

    Linux Kernel Developer

    Ukraine Β· Product Β· 3 years of experience Β· Intermediate
    Samsung R&D Institute Ukraine is looking for a passionate and collaborative Linux Kernel Developer to join our team in Kyiv. You will work with security and system development engineers tackling real-world tasks with Samsung flagships, introduce patches...

    Samsung R&D Institute Ukraine is looking for a passionate and collaborative Linux Kernel Developer to join our team in Kyiv.

    You will work with security and system development engineers tackling real-world tasks with Samsung flagships, introduce patches to the Kernel of not-yet-released Android versions,

    be involved in operating system development, learn about security model of Android and improve it on Samsung smartphones in use by hundreds of millions of users worldwide.

    If you love working directly on consumer-facing products we are glad to meet you at Samsung team of professionals in Samsung R&D Institute Ukraine. 

     

    More specifically you will

    • Design, develop, build, debug, test, profile Linux Kernel modules for Android devices
    • Develop Kernel-level security solutions
    • Participate in research activities and strategic prototyping for future Samsung products

     

    Major Requirements

    • Bachelor degree in computer science or similar
    • Knowledge of C, Kernel-level development
    • Building and testing Linux Kernel modules
    • Knowledge of Linux Kernel architecture and operation

     

    Optional Requirements

    • Knowledge of ARM technologies: TrustZone, GIC, MMU, NEON, VFP, Thumb
    • Knowledge of Linux Security architecture: MAC/DAC, SE, LSM, Android/Tizen security models
    • Experience with device drivers development
    • Knowledge of POSIX API
    • Applied cryptography: authentication & authorization protocols, crypto algorithms
    • Experience with bootloaders development / debugging
    • Experience with virtualization: XeN/KVM/QEMU
    • Ability to work collaboratively within teams on a set of innovative projects
    • Good technical English

     

    Benefits:

    • competitive salary, annual salary review, annual bonuses
    • paid 28 work days of annual vacations and sick leaves
    • opportunity to become an inventor of international patents with paid bonuses
    • medical & life insurance for employees and their children
    • paid lunches
    • discounts to Samsung products, services
    • regular education and self-development on internal courses and seminars
    • remote work is possible as well as work in Kyiv office
    More
  • Β· 15 views Β· 0 applications Β· 5d

    Senior/Principal AWS Cloud Security Engineer

    Full Remote Β· Ukraine Β· 6 years of experience Β· Upper-Intermediate
    Our client is seeking a Principal AWS Cloud Security and Compliance Engineer with extensive hands-on experience in securing cloud environments at scale. This role is ideal for a seasoned security expert who thrives on designing, implementing, and managing...

    Our client is seeking a Principal AWS Cloud Security and Compliance Engineer with extensive hands-on experience in securing cloud environments at scale. This role is ideal for a seasoned security expert who thrives on designing, implementing, and managing cloud security controls, ensuring compliance with industry standards, and mitigating security risks across AWS infrastructure. The ideal candidate will bring a deep understanding of AWS security services, regulatory compliance frameworks, and cloud-native security best practices.

     

    Main tasks and responsibilities:

    • Security Architecture & Design: Lead the design and implementation of secure AWS architectures, ensuring compliance with security frameworks and industry best practices
    • Governance & Compliance: Develop, enforce, and monitor compliance with SOC 2, ISO 27001, NIST, CIS, FedRAMP, PCI-DSS, HIPAA, and other security standards
    • Cloud Security Operations: Implement and manage AWS security services such as AWS IAM, AWS KMS, AWS GuardDuty, AWS Security Hub, AWS Macie, AWS Config, AWS WAF, and AWS Shield
    • Threat Detection & Incident Response: Develop SIEM integrations, monitor security logs, investigate incidents, and lead incident response efforts to mitigate threats
    • Automation & Infrastructure Security: Implement Infrastructure as Code (IaC) security policies using Terraform, AWS CloudFormation, or AWS CDK. Automate security monitoring and compliance reporting
    • Identity & Access Management (IAM): Define and enforce least privilege access controls, manage AWS Organizations and Service Control Policies (SCPs)
    • DevSecOps & CI/CD Security: Embed security into the CI/CD pipeline, ensuring secure deployment practices across cloud workloads
    • Security Risk Assessments: Perform cloud security risk assessments, threat modeling, and penetration testing to identify and mitigate vulnerabilities
    • Security Awareness & Training: Mentor engineering teams on secure coding, cloud security best practices, and AWS security controls
    • Stakeholder Collaboration: Work with engineering, compliance, and business teams to align security strategies with organizational goals

       

    Education, skills and experience:

    Must have:

    • 10+ years of hands-on experience in cybersecurity, cloud security, and compliance, with at least 5 years in AWS security
    • Expert-level knowledge of AWS security services, architecture, and best practices. Deep understanding of compliance frameworks (e.g., SOC 2, ISO 27001, NIST, FedRAMP, PCI-DSS, HIPAA)
    • Experience with AWS IAM, VPC security, AWS WAF, KMS, CloudTrail, Config, Security Hub, Macie, and GuardDuty
    • Proficiency in SIEM solutions, security automation, and cloud-native security tools
    • Hands-on experience with IaC security (Terraform, CloudFormation), container security (EKS, ECS), and serverless security
    • Strong background in DevSecOps, securing CI/CD pipelines, and integrating security into cloud-native development
    • Expertise in identity & access management (IAM), RBAC, MFA, and Zero Trust security models
    • Experience with incident response, threat detection, and forensic analysis in AWS
    • Proficient in scripting and automation (Python, Bash, or PowerShell)
    • Strong communication skills with the ability to influence technical and non-technical stakeholders

    Would be a plus:

    • AWS Certified Security – Specialty or AWS Certified Solutions Architect – Professional certification
    • Experience in multi-cloud security (AWS, Azure, GCP)
    • Familiarity with security risk management frameworks (e.g., MITRE ATT&CK, OWASP, CIS Benchmarks)
    • Knowledge of AI/ML security, API security, and data protection strategies
    More
  • Β· 68 views Β· 8 applications Β· 6d

    Security Operations

    Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 2 years of experience
    We are bill_line – a fintech company with global focus. Born in Ukraine, we’re steamrolling the world of payments all over the world. Our main product is a payment solution for any online business, and we’re polishing it to perfection every single day....

    We are bill_line – a fintech company with global focus. Born in Ukraine, we’re steamrolling the world of payments all over the world.

     

    Our main product is a payment solution for any online business, and we’re polishing it to perfection every single day. Any business that needs to accept payments is a bill_line partner: from a small online store to banks, insurance companies or charities.

     

    Why us?

     

    bill_line is a β€œswiss army knife” in the world of fintech for any client. This means our bizdev, support, legal and finance departments are always with our merchant – from a connection request to integration and transaction support.

     

    We’re proud of our approach and its results. But every success is a puzzle, and only the best team in the world can put all its pieces together. Do you want to be a part of it and change the Ukrainian and international fintech market? Then send us your CV, and we will consider it and definitely write back to you!

    Key Responsibilities:

    • Ensure compliance with legal requirements, including the Information Security and Cybersecurity Law.
    • Oversee cybersecurity and information security measures throughout the lifecycle of protected systems (design, implementation, operation, decommissioning).
    • Develop and implement information security policies, standards, and related documentation.
    • Monitor and investigate cybersecurity incidents and security breaches, particularly those impacting payment services.
    • Manage and maintain the functionality of information protection tools, ensuring timely recovery in case of failures.
    • Control the integrity and composition of hardware and software in information systems, preventing unauthorized or unapproved use.
    • Review and approve changes to IT systems, ensuring compliance with Ukrainian laws and security requirements of payment systems.
    • Organize training and upskilling for employees involved in cybersecurity and information security processes.
    • Conduct regular cybersecurity awareness training and workshops for all employees.

     

    What We’re Looking For:

    • Education: A degree in Information Security, Cybersecurity, IT, or related fields.
    • Experience: 2–3+ years in cybersecurity or information security roles.
    • Knowledge: Strong understanding of Ukrainian cybersecurity regulations and international standards (e.g., ISO/IEC 27001, NIST).
    • Technical Skills: Experience with cybersecurity tools, incident investigation, and security monitoring systems.
    • Policy Development: Proven ability to create and implement security policies and protocols.
    • Training: Skilled in organizing and delivering training sessions for employees.
    • Certifications (Preferred): CISSP, CISM, CEH, or similar are a plus.
    • Personal Qualities: Analytical mindset, responsibility, and ability to multitask in a dynamic environment.

     

    πŸ’‘What we offer

    🌐Our HQ is in invincible Kyiv, near the Zvirynetska metro station. We also have a cool EU office if you’re relocated.

    πŸ‘¨β€πŸ’»You will instantly have everything you need to work (the best equipment, necessary subscription services and everything that will make you effective)

    ⚑Remote work

    πŸ–οΈWe have 24 days of paid vacation. If you are a workaholic and have not used it, we’ll compensate you with money;

    πŸ’ŠWe pay sick leave in full.

    πŸ₯— Corporate lunches.

    πŸ‘©β€πŸ”¬Mandatory health insurance

    πŸ§˜β€β™€οΈSessions with psychologists - we support mental health

     

    πŸ’‘ How we have fun

    The best team is our main asset and a reason for pride. Your future colleagues love active recreations, sharing impressions of a movie or listening to their favorite music together. We often end the working week with fun Friday mini-parties with colleagues.

     

    πŸ’‘ People care

    Our  internal corporate culture is based on caring: we support each other, and the company helps colleagues to grow professionally.

    We care about the health of our colleagues and hold Health Days.

     

    πŸ’‘ Training and development

    We regularly participate in top international fintech, e-commerce, crypto conferences, meetings.

    We pay for training (courses, trainings, seminars) for professional growth and team development.

    We support you in learning English or other languages, especially for expansion into new markets!

    More
Log In or Sign Up to see all posted jobs