Jobs
73-
Β· 17 views Β· 4 applications Β· 1d
Head of IT Operations and Security
Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 5 years of experience Β· Upper-Intermediate Ukrainian Product πΊπ¦Weβre looking for a sharp, business-oriented expert to lead Information Security, IT Systems, and Automation initiatives across the company β someone who balances strategic thinking with hands-on execution and turns complexity into secure, scalable, and...Weβre looking for a sharp, business-oriented expert to lead Information Security, IT Systems, and Automation initiatives across the company β someone who balances strategic thinking with hands-on execution and turns complexity into secure, scalable, and streamlined solutions that truly serve business goals.
You donβt just manage systems β you align systems with business needs.
You donβt just run security β you see and mitigate risks before they become problems..
You donβt just automate β you transform.
If you thrive in complexity, love solving meaningful problems, and think like an expert partner (not just a task executor) β this role is for you.
Requirements:
- Ability to analyze complex security issues and deliver effective, practical solutions.
- Deep knowledge of information security principles, standards, network protection, encryption, and secure coding practices.
- Proficiency in conducting risk assessments, vulnerability assessments, and penetration testing.
- Experience managing or working with Ops, DevOps, Jira, Helpdesk, and Development teams.
- Competence in managing IT audits, performance evaluations, and cost-efficient planning.
- Solid background in IT architecture design, systems integration (ERP, CRM, HRM, project management tools), and optimization.
- Ability to lead complex IT projects and large-scale system migrations.
- Track record of engaging external experts to enhance delivery where required.
- English - Upper-Intermediate level.Personal qualities:
- Strong project and team management skills, with the ability to lead cross-functional teams and delegate effectively while staying hands-on when needed.
- Accountable and self-driven β you follow through without reminders.
- Solution-oriented - you bring problems with proposed solutions.
- Open to feedback, adaptable to change, and persistent when you believe in the idea.
- Fast and responsive - you act quickly, avoid overcomplicating, while thinking long-term.
- Data- and result-driven β you base decisions on facts and aim for real outcomes.
- Customer-focused β with a strong understanding of service mindset and what it means to create value for clients.
- Strong communicator β you align, clarify, and solve across all levels.
- High standards β you raise the bar, not settle for βgood enough.β
- Able to prioritize what truly creates value for the business.
Responsibilities:
Information Security & Risk Management:
- Develop and implement security policies, standards, and procedures.
- Manage access control and protect internal systems.
- Conduct risk assessments and monitor security threats.
- Respond to incidents and mitigate vulnerabilities.
- Educate employees on security best practices.
IT Systems & Infrastructure
- Maintain an optimized, scalable, and secure architecture, aligned with business priorities.
- Ensure system integration, data integrity, and interoperability across core platforms (CRM, ERP, HRM, etc.).
- Oversee technical operations teams to ensure efficient and secure operations.
- Drive automation and process improvements.
Automation & AI Initiatives
- Identify and implement high-impact automation and AI opportunities.
- Ensure effective integration of AI tools into business processes.
- Measure effectiveness and business impact of implemented solutions.
- Coordinate cross-functional automation initiatives and promote knowledge-sharing.
- Involve external expertise to strengthen outcomes where needed.
What we offer:
- Flexible schedule. You can work remotely or from our comfortable offices. The workday starts from 8:00 to 11:00;- Time Offs Loyalty System - 28 Business Days of Paid Time Off per year (after 3 months of cooperation);
- We care about your health. We guarantee that we will cover your medical insurance once your probation period is over. And once a year, we organize a flu shot;
- Mental Health webinars where we discuss psychological topics.
- Professional Growth and Development Personal Development Plan, internal educational activities, reimbursement of external educational activities, including the ones abroad.
- English Courses and Speaking Clubs;
- Corporate currency - Boosta coins and spend them on extra day-offs or our branded products (from T-shirts to AirPods).
What stages do we have:β’ 1st stage: pre-screen with recruiter;
β’ 2nd stage: interview with hiring manager;
β’ 3nd stage: test task
β’ 4nd stage: bar-raising
β’ 5th stage: referrals and offer.Apply now and become a Head of IT Operations & Security!
More -
Β· 15 views Β· 3 applications Β· 1d
Information Security Officer (ISO)
Full Remote Β· Worldwide Β· Product Β· 5 years of experience Β· IntermediateCompany: Developer of a B2C trading platform Company size: 150+ employees and growing Work format: remote Reporting to: CEO, close collaboration with CTO Why is this role exciting? This is a unique opportunity to build the security function from the...Company: Developer of a B2C trading platform
Company size: 150+ employees and growing
Work format: remote
Reporting to: CEO, close collaboration with CTO
Why is this role exciting?
This is a unique opportunity to build the security function from the ground up in a fast-growing tech company. Youβll be working in a young and friendly team, tackling real security challenges rather than focusing on compliance and certification. The company values practical and efficient security that brings real benefits to the business.
The role offers plenty of interesting challenges, room for professional growth, and the opportunity to set up the security function as needed. If youβre passionate about hands-on security, solving real-world security problems, and making an impact, this role is for you!
Responsibilities:
- Building a corporate information and cybersecurity system from scratch, aligning with business strategy and leadership expectations
- Identify security risks in business processes, evaluate, and prioritise mitigation controls
- Executethe cybersecurity roadmap with alignment to the emerging threats
- Implementing and managing access control (SSO, MFA, RBAC)
- Developing and enforcing information security policies for personal data protection (PII), information, and access management procedures
- Establishing vulnerability management processes
- Control network and application security resilience against attacks (DDoS, takeovers, injections, etc.),
- Developing and implementing workstation security with Mobile Device Management (MDM) policies and XDR tools
- Collaborating with IT and development teams on the platformβs security architecture, customer security aspects in products, and enabling DevSecOps
- Lead the security incident management process, orchestration, and control execution
Conducting security training and fostering a strong security culture
Requirements:
- 5+ years of experience in information security
- Strong knowledge in security frameworks such as ISO27000, NIST, SOC, CSI or similar
- Practical understanding of IAM, PII protection built into the operational process of the company
- Experience in setting up vulnerability and patch management processes
- Familiarity with security threats and mitigation practices for DDoS, brute forces, injections, etc.
- Experience in mobile security, anti-virus tools, and BYOD policies
- Understanding of DevSecOps and the secure software development concept
- Ability to design security processes from scratch and their adoption
- Practical knowledge of cryptocurrencies and the risks associated with crypto
- Excellent communication and reporting skills
- Agility in risk management
Nice to have:
- Experience in fintech companies or trading platforms
- Experience in implementing SOC, DLP, and SIEM
- Knowledge of compliance frameworks (GDPR, PCI DSS)
We offer flexibility in discussing terms, building a team, and providing the necessary resources to create a strong, practical security system that truly benefits the business.
More -
Β· 12 views Β· 2 applications Β· 1d
Information Security Manager
Full Remote Β· Ukraine Β· 3 years of experience Β· Upper-IntermediateJoin our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clientsβ digital assets. Responsibilities: Implement security measures in alignment with industry frameworks. Conduct security...Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clientsβ digital assets.
Responsibilities:
- Implement security measures in alignment with industry frameworks.
- Conduct security assessments for client projects using established methodologies and provide actionable recommendations.
- Collaborate with development teams to identify risks and implement the most efficient security solutions.
- Promote security services by engaging with clients and presenting solutions.
Requirements:
- 3+ years of experience with security frameworks such as ISO 27001, SOC 2, or NIST CSF.
- Knowledge of cloud security, with practical experience, is a plus.
- Understanding of Secure SDLC and software security architecture is a plus.
- Ability to engage clients and provide expert security consulting.
- A structured approach to work and clear documentation skills.
- Ability to automate tasks using any programming language and AI tools.
- Upper-Intermediate English or higher.
Our benefits:
GROWTH & EDUCATION
- Individual development plan.
- Mentoring program.
- Evaluation process.
- Professional education.
- Covering the cost of professional certifications.
- Corporate library.
- English classes.
COMMUNITY
- Technological community.
- Volunteering & Charity.
- Yalantis events.
- Yalantis Education.
- Project team building activities.
WELLBEING
- Medical insurance, health check-ups, and compensation for sports activities are up to you.
- Vacation & Days Off.
- Mental health support program.
- Public holidays.
- Financial and legal support for private entrepreneurs.
WORK ENVIRONMENT
- Cozy offices (Dnipro, Kyiv, Warsaw).
- Corporate Top-notch equipment and quality tools.
- Flexible format of work.
- Eco & Pet-friendly space.
- Fun activities in offices.
- Y-bucks & Yalantis store.
Please note that feedback with the results of the CV review will be provided only in the event of a decision to consider your candidacy further.
More
Otherwise, your data will be retained in the companyβs CV database, and we will gladly contact you if a suitable vacancy becomes available. The consideration period is 7 working days. -
Β· 11 views Β· 1 application Β· 1d
Corporate Security Lead
Full Remote Β· Ukraine Β· Product Β· 5 years of experience Β· Intermediate Ukrainian Product πΊπ¦Uklon β ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Π° IT-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠ°ΠΉΠ΄-Ρ Π΅ΠΉΠ»ΡΠ½Π³ ΡΠ΅ΡΠ²ΡΡ. Π©ΠΎΠ΄Π½Ρ ΠΏΠΎΡΡΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡΠΎΠΊΠ°ΡΡΡ ΠΎΠ΄Π½Ρ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡ Π½Π° ΡΠΈΠ½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π·Π° ΡΡ ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΠΈ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΄ΡΠ°ΠΉΠ²Π΅ΡΡΠ² ΡΠ° ΡΠ°ΠΉΠ΄Π΅ΡΡΠ². ΠΠΈ ΡΡΠ²ΠΎΡΡΡΠΌΠΎ highload...MoreUklon β ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Π° IT-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠ°ΠΉΠ΄-Ρ Π΅ΠΉΠ»ΡΠ½Π³ ΡΠ΅ΡΠ²ΡΡ. Π©ΠΎΠ΄Π½Ρ ΠΏΠΎΡΡΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡΠΎΠΊΠ°ΡΡΡ ΠΎΠ΄Π½Ρ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡ Π½Π° ΡΠΈΠ½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π·Π° ΡΡ ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΠΈ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΄ΡΠ°ΠΉΠ²Π΅ΡΡΠ² ΡΠ° ΡΠ°ΠΉΠ΄Π΅ΡΡΠ².
ΠΠΈ ΡΡΠ²ΠΎΡΡΡΠΌΠΎ highload ΠΏΡΠΎΠ΄ΡΠΊΡ, Π·Π° ΡΠΊΠΈΠΌ Ρ ΠΎΠ²Π°ΡΡΡΡΡ Π°ΠΌΠ±ΡΡΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Ρ ΡΠ΅Π»Π΅Π½Π΄ΠΆΡ, Π±Π΅Π·ΠΏΠ΅ΡΠ΅ΡΠ²Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΡ ΡΠ° Π½Π΅ΠΎΡΠ΅Π²ΠΈΠ΄Π½Ρ Ρ ΠΎΠ΄ΠΈ. ΠΠ°Ρ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊ ΡΠΎΠ±ΠΎΡΠΈ β ΡΠ΅ΡΡΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π³ΡΠΏΠΎΡΠ΅Π·ΠΈ, ΠΏΡΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ΄Π΅Ρ ΡΠ° Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΠ²Π°ΡΠΈ ΠΎΡΡΠ°Π½Π½ΡΠΉ ΡΡΠ΅ΠΊ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ.
ΠΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ Π½Π°Ρ Ρ ΡΠΎΠ»Ρ Corporate Security Lead Π² ΠΠΈΡΠ²ΡΠ©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ ΡΠ°ΠΌΠ΅ Π΄Π»Ρ ΡΡΡΡ ΡΠΎΠ»Ρ:
β’ ΠΏΠΎΠ²Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ Π·Π° ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΡ β ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΡΠ°ΠΌΠΎΡΡΡΠΉΠ½ΠΎ ΠΊΠ΅ΡΡΠ²Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡ Π·Π°Ρ ΠΈΡΡΡ
β’ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· ΡΠΎΠΏΠΎΠ²ΠΈΠΌΠΈ Π΅ΠΊΡΠΏΠ΅ΡΡΠ°ΠΌΠΈ β ΠΎΠ±ΠΌΡΠ½ Π·Π½Π°Π½Π½ΡΠΌΠΈ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ Π· ΡΠ°Ρ ΡΠ²ΡΡΠΌΠΈ Ρ ΡΡΠ΅ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π΄ΠΎΡΡΡΠΏ Π΄ΠΎ Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠ΅ΡΡΡΡΡΠ² β ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ Π·Π°Π»ΡΡΠ°ΡΠΈ ΠΊΠΎΠ½ΡΠ°Π»ΡΠΈΠ½Π³ΠΎΠ²Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π΄Π»Ρ ΠΏΡΠ΄ΡΠΈΠ»Π΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²ΠΈΡ ΡΠ½ΡΡΡΠ°ΡΠΈΠ²
β’ ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡΠ²Π°ΡΠΈ ΡΠΈΡΡΠ΅ΠΌΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π΄ΠΎΠ΄Π°ΡΡΠΈ ΡΠ° Π½Π°Π»Π°ΡΡΠΎΠ²ΡΡΡΠΈ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ½Ρ ΡΠΎΡΠΊΠΈ Π΄Π»Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ
β’ ΡΡΡΠ°ΡΠ½Ρ ΠΏΡΠ΄Ρ ΠΎΠ΄ΠΈ Π΄ΠΎ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠ²
β’ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΈΠΉ performance & salary review
β’ ΠΊΡΠ»ΡΡΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π² ΡΠΊΡΠΉ ΠΊΠΎΠΆΠ΅Π½ Ρ Π·Π½Π°ΡΡΡΠΈΠΌ Ρ ΡΡΠ½Π½ΠΈΠΌ ΡΠ° ΠΌΠ°Ρ Π²ΠΏΠ»ΠΈΠ² Π½Π° ΠΏΡΠΎΡΠ΅ΡΠΈΠ―ΠΊ ΡΠ°ΠΌΠ΅ ΡΠΈ ΠΌΠΎΠΆΠ΅Ρ Π²ΠΏΠ»ΠΈΠ²Π°ΡΠΈ Π½Π° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ:
β’ ΡΠΎΡΠΌΡΠ²Π°Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΡ ΡΡΡΠ°ΡΠ΅Π³ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ESRM
β’ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π°ΠΊΡΡΠ°Π»ΡΠ·Π°ΡΡΡ ΠΊΠ°ΡΡΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠΏΡΠ»ΡΠ½ΠΎ Π· ΠΊΠ΅ΡΡΠ²Π½ΠΈΠΊΠ°ΠΌΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»ΡΠ²
β’ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π· ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΡΠ·ΠΈΡΠ½ΠΎΡ, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ ΡΠ° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΡ
β’ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΌΠ΅Ρ Π°Π½ΡΠ·ΠΌΡΠ² Π²Π½ΡΡΡΡΡΠ½ΡΠΎΠ³ΠΎ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ
β’ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, ΠΏΠΎΠΏΠ΅ΡΠ΅Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° Π·Π°Π³ΡΠΎΠ·ΠΈ Π΄Π»Ρ Π°ΠΊΡΠΈΠ²ΡΠ² ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ
β’ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ»Π°Π½ΡΠ² ΠΊΡΠΈΠ·ΠΎΠ²ΠΎΠ³ΠΎ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ Π°Π½ΡΠΈΠΊΡΠΈΠ·ΠΎΠ²ΠΎΡ Π³ΡΡΠΏΠΈ
β’ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΡΡΠ΅ΠΌΠΎΡ ΡΡΠ·ΠΈΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ (ΠΎΡ ΠΎΡΠΎΠ½Π°, ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ½ΠΎ-ΡΠ΅Ρ Π½ΡΡΠ½Ρ Π·Π°ΡΠΎΠ±ΠΈ, Π²Π½ΡΡΡΡΡΠ½Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡΠΈ, Π±Π΅Π·ΠΏΠ΅ΠΊΠ° ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ ΡΠΎΡΠΎ)
β’ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ΠΏΡΠΎΡΠΈΠ΄ΡΡ ΡΠ°Ρ ΡΠ°ΠΉΡΡΠ²Ρ, ΠΊΡΠ°Π΄ΡΠΆΠΊΠ°ΠΌ, ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΌ Π·Π»ΠΎΡΠΈΠ½Π°ΠΌ ΡΠΎΡΠΎ)
β’ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·Π°Ρ ΠΈΡΡ ΠΊΠΎΠ½ΡΡΠ΄Π΅Π½ΡΡΠΉΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ
β’ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ° ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²ΡΠ°Π½Ρ, ΡΠ½ΡΡΡΡΠΊΡΠ°ΠΆΡΠ² ΡΠ° ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΡΡΠ²Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ Π· ΠΏΠΈΡΠ°Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· ΠΏΡΠ°Π²ΠΎΠΎΡ ΠΎΡΠΎΠ½Π½ΠΈΠΌΠΈ ΠΎΡΠ³Π°Π½Π°ΠΌΠΈ, ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΡΡΠΈΠΌΠΈ ΡΡΡΡΠΊΡΡΡΠ°ΠΌΠΈ ΡΠ° ΠΏΠ°ΡΡΠ½Π΅ΡΠ°ΠΌΠΈ Ρ ΡΡΠ΅ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎ-Π°Π½Π°Π»ΡΡΠΈΡΠ½Π΅ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π·Π° Π½Π°ΠΏΡΡΠΌΠΊΠΎΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π±Π΅Π·ΠΏΠΎΡΠ΅ΡΠ΅Π΄Π½Ρ ΡΡΠ°ΡΡΡ Ρ ΡΠΎΠ·Π±ΡΠ΄ΠΎΠ²Ρ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π±ΡΠ·Π½Π΅ΡΡ
Π§Π΅Π»Π΅Π½Π΄ΠΆΡ Π½Π° 6 ΠΌΡΡΡΡΡΠ²:
β’ ΠΎΠ·Π½Π°ΠΉΠΎΠΌΠ»Π΅Π½Π½Ρ ΡΠ° Π²ΠΈΠ²ΡΠ΅Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ Π±ΡΠ·Π½Π΅Ρ-ΠΏΡΠΎΡΠ΅ΡΡΠ²
β’ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ ΡΠ° ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π·Π° Π½Π°ΠΏΡΡΠΌΠΊΠ°ΠΌΠΈ: ΡΡΠ·ΠΈΡΠ½Π°, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Π° ΡΠ° ΠΊΠ°Π΄ΡΠΎΠ²Π° Π±Π΅Π·ΠΏΠ΅ΠΊΠ°)
β’ Π·Π°ΡΠ²Π΅ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ ΡΠ° ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π· ΠΊΠ΅ΡΡΠ²Π½ΠΈΠΊΠΎΠΌΠΠ»Ρ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡΠ², ΡΠΎΠ±Ρ Π·Π½Π°Π΄ΠΎΠ±Π»ΡΡΡΡΡ:
β’ Π²ΠΈΡΠ° ΠΎΡΠ²ΡΡΠ° (ΡΡΠΈΠ΄ΠΈΡΠ½Π°, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Π°, Π°Π±ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½Π°)
β’ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 5 ΡΠΎΠΊΡΠ² Π½Π° ΠΊΠ΅ΡΡΠ²Π½ΠΈΡ ΠΏΠΎΡΠ°Π΄Π°Ρ Π² ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π³Π»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΠΉ ASIS International ΡΠ° ΡΡ Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ Ρ ΡΡΠ΅ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Enterprise Security Risk Management (ESRM)
β’ Π·Π½Π°Π½Π½Ρ Π·Π°ΠΊΠΎΠ½ΠΎΠ΄Π°Π²ΡΡΠ²Π° Π£ΠΊΡΠ°ΡΠ½ΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° Π² Π³Π°Π»ΡΠ·Ρ, Π΄ΠΎΡΠΈΡΠ½ΡΠΉ Π΄ΠΎ ΡΡΠ½ΠΊΡΡΠΉ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π·Π΄Π°ΡΠ½ΡΡΡΡ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ΡΡΠ·ΠΈΡΠ½ΠΎΡ, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ, ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ)
β’ Π½Π°Π²ΠΈΡΠΊΠΈ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΡΡΡΠ°ΡΠ΅Π³ΡΠΉ Π·Π°Ρ ΠΈΡΡΡ Π°ΠΊΡΠΈΠ²ΡΠ², ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π°ΠΏΠΈΡΠ°Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΡΡΡΠ°ΡΠ΅Π³ΡΠΉ Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π΄ΠΎΡΠ²ΡΠ΄ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· Π΄Π΅ΡΠΆΠ°Π²Π½ΠΈΠΌΠΈ ΡΡΡΡΠΊΡΡΡΠ°ΠΌΠΈ, ΠΏΡΠ°Π²ΠΎΠΎΡ ΠΎΡΠΎΠ½Π½ΠΈΠΌΠΈ ΠΎΡΠ³Π°Π½Π°ΠΌΠΈ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΡΡΠΈΠΌΠΈ ΡΠ½ΡΡΠΈΡΡΡΡΡΠΌΠΈ
β’ Π·Π½Π°Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π²ΡΠ΄Π΅ΠΎΡΠΏΠΎΡΡΠ΅ΡΠ΅ΠΆΠ΅Π½Π½Ρ, ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ, ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠ° ΡΠΎΡΠΎ)
β’ Π½Π°ΡΠ²Π½ΡΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠ² ASIS International (Ρ ΡΡΠ΅ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ), ΠΠΠΠ Π£ΠΊΡΠ°ΡΠ½ΠΈ
β’ Π΄ΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΏΡΠ΄ΠΏΡΠΈΡΠΌΡΡΠ²Π°
β’ Π·Π½Π°Π½Π½Ρ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ ΠΌΠΎΠ²ΠΈ Π½Π° ΡΡΠ²Π½Ρ Π²ΡΠ΄ Intermediate
Π―ΠΊ ΡΠΈ ΡΠ΅Π³ΡΠ»ΡΡΡ ΡΠ²ΡΠΉ ΡΠΎΠ±ΠΎΡΠΈΠΉ ΡΠ°Ρ?
β’ Π³Π½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ Π· ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΈΠΌΠΈ ΡΠΏΡΠ»ΡΠ½ΠΈΠΌΠΈ Π³ΠΎΠ΄ΠΈΠ½Π°ΠΌΠΈ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· 11:00 Π΄ΠΎ 16:00
β’ days off Π·Ρ Π·Π±Π΅ΡΠ΅ΠΆΠ΅Π½Π½ΡΠΌ Π²ΠΈΠ½Π°Π³ΠΎΡΠΎΠ΄ΠΈ: 20 Π½Π° ΠΎΡΠΎΠ±ΠΈΡΡΡ ΠΏΠΎΡΡΠ΅Π±ΠΈ, ΡΠ΅ 1 Π· Π½Π°Π³ΠΎΠ΄ΠΈ Π΄Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ, 10 ΡΠ΅ΡΠ΅Π· Ρ Π²ΠΎΡΠΎΠ±Ρ, Π΄ΠΎ 8-ΠΌΠΈ Π·Π° Π΄ΠΎΠ½Π°ΡΡΡ ΠΊΡΠΎΠ²Ρ
Π―ΠΊ ΡΠΈ Π±ΡΠ΄Π΅Ρ ΠΏΡΠΎΠΊΠ°ΡΡΠ²Π°ΡΠΈ ΡΠ²ΠΎΡ ΡΠΊΡΠ»ΠΈ Π² Uklon?
β’ Π²Π½ΡΡΡΡΡΠ½ΡΠΉ ΠΎΠ±ΠΌΡΠ½ Π·Π½Π°Π½Π½ΡΠΌΠΈ, ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ ΠΌΠ΅Π½ΡΠΎΡΡΡΠ²Π° ΡΠ° ΡΡΠ΅Π½ΡΠ½Π³ΠΈ Π· ΡΠΎΠ·Π²ΠΈΡΠΊΡ soft ΡΠ° hard skills
β’ ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΠΏΡΠΎΡΡΠ»ΡΠ½ΠΈΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ Π΄Π»Ρ Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ²
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° Π±ΡΠ±Π»ΡΠΎΡΠ΅ΠΊΠ° ΡΠ° ΠΏΡΠ΄ΠΏΠΈΡΠΊΠΈ Π½Π° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Ρ ΡΠ΅ΡΡΡΡΠΈ
β’ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΠΉ/ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΈΠΉ Π±ΡΠ΄ΠΆΠ΅Ρ Π½Π° Π½Π°Π²ΡΠ°Π½Π½Ρ
β’ ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ English lessons Π· Π²ΡΠ΄ΠΎΠΌΠΈΠΌΠΈ ΠΏΡΠΎΠ²Π°ΠΉΠ΄Π΅ΡΠ°ΠΌΠΈ
Care and support:
β’ ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ Π² Π£ΠΊΡΠ°ΡΠ½Ρ
β’ ΡΠ΅ΡΡΡ Π· ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΠΎΠΌ
β’ Π·Π±Π΅ΡΠ΅ΠΆΠ΅Π½Π½Ρ 100% ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π½Π°ΡΠΈΡ Π·Π°Ρ ΠΈΡΠ½ΠΈΠΊΡΠ²
β’ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ²ΠΎΡΡ Π±ΡΠΉΡΡΠ² Π² ΠΠ‘Π£ Π°ΠΌΡΠ½ΡΡΡΡΡ ΡΠ° ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½ΡΠ°ΠΌΠΈ
β’ Π³Π΅ΠΉΠΌΡΡΡΠΊΠ°ΡΡΡ, ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ ΡΠ° ΡΠΎΠ·ΡΠ³ΡΠ°ΡΡ
β’ ΡΠΏΠΎΡΡΠΈΠ²Π½Ρ Π·Π°Ρ ΠΎΠ΄ΠΈ ΡΠ° ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ ΡΡΠΌΠ±ΡΠ»Π΄ΡΠ½Π³ΠΈ
β’ ΠΏΡΠΎΠΌΠΎΠΊΠΎΠ΄ΠΈ Π½Π° ΠΏΠΎΡΠ·Π΄ΠΊΠΈ Π· Uklon
Regular Sport Activities:
β’ Uklon Football ΡΠΎΡΠΈΠΆΠ½Ρ
β’ Uklon Online Yoga ΡΠΎΡΠΈΠΆΠ½Ρ
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ, ΡΠ°ΡΡΠΊΠΎΠ²Π° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π·Π°Π½ΡΡΡ ΡΠΏΠΎΡΡΠΎΠΌ
Corporate social responsibility
Π©Π΅ Π· 2014 ΡΠΎΠΊΡ Uklon Π°ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ΄ΡΡΠΈΠΌΡΡ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΡ Π°ΡΠΌΡΡ ΡΠ° Π²ΠΎΠ»ΠΎΠ½ΡΠ΅ΡΡΡΠΊΡ ΡΠΏΡΠ»ΡΠ½ΠΎΡΡ, Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΈΠΌ ΠΏΠ°ΡΡΠ½Π΅ΡΠΎΠΌ ΠΠ€ <ΠΠΎΠ²Π΅ΡΠ½ΠΈΡΡ ΠΆΠΈΠ²ΠΈΠΌ>, Π° Π· 2022 ΡΠΎΠΊΡ Π½Π°Π΄Π°Ρ ΡΠΎΠΌΡΡΡΡΠ½Ρ ΡΡΠ½Π°Π½ΡΠΎΠ²Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ <Π€ΠΎΠ½Π΄Ρ Π‘Π΅ΡΠ³ΡΡ ΠΡΠΈΡΡΠ»ΠΈ>. Π’Π°ΠΊΠΎΠΆ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΎ ΠΏΡΠ΄ΡΡΠΈΠΌΡΡ ΡΠ° ΠΎΡΠ³Π°Π½ΡΠ·ΠΎΠ²ΡΡ Π·Π±ΠΎΡΠΈ, Π½Π°Ρ ΡΠΎΠΊΡΡ β Π΄ΡΠΎΠ½ΠΈ, Π°Π±ΠΈ Π²ΠΎΡΠ²Π°Π»ΠΈ Π²ΠΎΠ½ΠΈ, Π° Π½Π΅ Π»ΡΠ΄ΠΈ.
Π ΡΠΎΠ± Π·Π°Π»ΡΡΠΈΡΠΈ Π΄ΠΎ Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½ΠΎΡΡΡ ΡΠΏΡΠ»ΡΠ½ΠΎΡΡ ΡΠ°ΠΉΠ΄Π΅ΡΡΠ² Uklon, Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΎΠΊ Π΄ΠΎΠ΄Π°Π»ΠΈ ΡΡΠ½ΠΊΡΡΡ ΡΠ°Π·ΠΎΠ²ΠΎΠ³ΠΎ ΡΠ° ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠ½Π°ΡΡ.
Π―ΠΊΡΠΎ ΡΠΈ ΡΡΠΊΠ°ΡΡ Π΄ΡΠ°ΠΉΠ²ΠΎΠ²Ρ ΡΠ° Π°ΠΌΠ±ΡΡΡΠΉΠ½Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΎΡΡΡΠ½ΡΠΎΠ²Π°Π½Ρ Π½Π° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ ΡΠ° ΡΠ²ΡΡΠΎΠ²Ρ Π΅ΠΊΡΠΏΠ°Π½ΡΡΡ, Π·Π°ΡΡΠΊΠ°Π²Π»Π΅Π½ΠΈΠΉ Ρ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ Π½ΠΎΠ²ΡΡΠ½ΡΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠ° Π³ΠΎΡΠΎΠ²ΠΈΠΉ Π΄Π°Π»Ρ ΠΏΡΠ΄Π²ΠΈΡΡΠ²Π°ΡΠΈ ΡΠ²ΠΎΡ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·Ρ, ΠΏΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ Uklon.
ΠΠ΅ΡΠ΅Π΄ ΠΏΠΎΠ΄Π°Π½Π½ΡΠΌ Π·Π°ΡΠ²ΠΊΠΈ Π½Π° Π²ΡΠ΄ΠΊΡΠΈΡΡ ΠΏΠΎΠ·ΠΈΡΡΡ Π² Uklon, Π±ΡΠ΄Ρ Π»Π°ΡΠΊΠ°, ΠΎΠ·Π½Π°ΠΉΠΎΠΌΡΠ΅ΡΡ Π· Π£ΠΌΠΎΠ²Π°ΠΌΠΈ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ². ΠΠ°Π΄ΡΠΈΠ»Π°ΡΡΠΈ Π½Π°ΠΌ ΡΠ²ΠΎΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½Ρ Π΄Π°Π½Ρ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ΡΡ, ΡΠΎ ΠΌΡΡΡΡΡΡΡΡ Ρ Π²Π°ΡΠΎΠΌΡ ΡΠ΅Π·ΡΠΌΠ΅, Π²ΠΈ Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ ΡΠΈΡ Π£ΠΌΠΎΠ². -
Β· 9 views Β· 0 applications Β· 1d
Cyber Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· Intermediate Ukrainian Product πΊπ¦Ajax Systems β ΡΠ΅ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Π° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Π° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΠΉ Π² ΠΠ²ΡΠΎΠΏΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊ Ρ Π²ΠΈΡΠΎΠ±Π½ΠΈΠΊ ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ajax ΡΠ· ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡΠΌΠΈ ΡΠΎΠ·ΡΠΌΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠΌΡ. Π¦Π΅ ΡΡΠ»Π° Π΅ΠΊΠΎΡΠΈΡΡΠ΅ΠΌΠ° Π·Ρ 180 ΠΏΡΠΈΡΡΡΠΎΡΠ², ΠΌΠΎΠ±ΡΠ»ΡΠ½ΠΈΡ Ρ Π΄Π΅ΡΠΊΡΠΎΠΏΠ½ΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², ΡΠ΅ΡΠ²Π΅ΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠΎΠΆΠ½ΠΎΠ³ΠΎ...Ajax Systems β ΡΠ΅ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Π° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Π° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΠΉ Π² ΠΠ²ΡΠΎΠΏΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊ Ρ Π²ΠΈΡΠΎΠ±Π½ΠΈΠΊ ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ajax ΡΠ· ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡΠΌΠΈ ΡΠΎΠ·ΡΠΌΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠΌΡ. Π¦Π΅ ΡΡΠ»Π° Π΅ΠΊΠΎΡΠΈΡΡΠ΅ΠΌΠ° Π·Ρ 180 ΠΏΡΠΈΡΡΡΠΎΡΠ², ΠΌΠΎΠ±ΡΠ»ΡΠ½ΠΈΡ Ρ Π΄Π΅ΡΠΊΡΠΎΠΏΠ½ΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², ΡΠ΅ΡΠ²Π΅ΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠΎΠΆΠ½ΠΎΠ³ΠΎ ΡΠΎΠΊΡ ΠΌΠΈ Π΄Π΅ΠΌΠΎΠ½ΡΡΡΡΡΠΌΠΎ ΠΊΡΠ°ΡΠ½Π΅ Π·ΡΠΎΡΡΠ°Π½Π½Ρ ΡΠΊ Ρ ΡΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠ°ΠΊ Ρ Π² ΠΊΡΠ»ΡΠΊΠΎΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ² Ρ Π²ΡΡΠΎΠΌΡ ΡΠ²ΡΡΡ. ΠΠ°ΡΠ°Π·Ρ Π² ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π±ΡΠ»ΡΡΠ΅ 4 100 ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ². Π Π΄Π°ΡΡΠΈΠΊΠΈ Ajax ΠΎΡ ΠΎΡΠΎΠ½ΡΡΡΡ 3,5 ΠΌΠ»Π½ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ² Ρ Π±ΡΠ»ΡΡ Π½ΡΠΆ 187 ΠΊΡΠ°ΡΠ½Π°Ρ ΡΠ²ΡΡΡ.
Ajax Systems ΠΌΠ°Ρ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²ΠΎ ΠΏΠΎΠ²Π½ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ: Π²ΡΠ΄ Π³Π΅Π½Π΅ΡΠ°ΡΡΡ ΡΠ΄Π΅ΠΉ ΡΠ° ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠΎΡΠΈΠΏΡΠ² Π΄ΠΎ ΠΌΠ°ΡΠΎΠ²ΠΎΠ³ΠΎ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²Π° ΡΠ° ΠΏΡΠΎΠ΄Π°ΠΆΡ ΠΏΠΎ Π²ΡΡΠΎΠΌΡ ΡΠ²ΡΡΡ. ΠΠΎΠΆΠ΅Π½ Π΄Π΅ΠΏΠ°ΡΡΠ°ΠΌΠ΅Π½Ρ Π·Π°ΠΊΡΠΈΠ²Π°Ρ ΠΏΠ΅Π²Π½Ρ ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½Ρ ΠΏΠΎΡΡΠ΅Π±Ρ Π±ΡΠ·Π½Π΅ΡΡ Π² ΠΏΠΎΠ²Π½ΡΠΉ ΠΌΡΡΡ. Π€Π°Ρ ΡΠ²ΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π·Π°Π»ΡΡΠ΅Π½Ρ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ : Π²ΡΠ΄ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΠΎΡ Π»ΡΠ½ΡΡ Π² Π£ΠΊΡΠ°ΡΠ½Ρ Π΄ΠΎ Π»ΠΎΠ³ΡΡΡΠΈΡΠ½ΠΎΠ³ΠΎ ΡΠ΅Π½ΡΡΡ Π² ΠΠΎΠ»ΡΡΡ, Π·Π²ΡΠ΄ΠΊΠΈ ΠΏΡΠΎΠ΄ΡΠΊΡΡΡ Π²ΡΠ΄ΠΏΡΠ°Π²Π»ΡΡΡΡ Π΄ΠΈΡΡΡΠΈΠ±ΚΌΡΡΠΎΡΠ°ΠΌ ΠΏΠΎ Π²ΡΡΠΎΠΌΡ ΡΠ²ΡΡΡ.
ΠΠΈ Π½Π°ΡΠ°Π·Ρ ΡΡΠΊΠ°ΡΠΌΠΎ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΎΠ³ΠΎ Π»ΡΠ΄Π΅ΡΠ° Π² ΡΡΠ΅ΡΡ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΊΠΈΠΉ Π±ΡΠ΄Π΅ ΡΠΏΡΠ°Π²Π»ΡΡΠΈ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ ΡΠ°Ρ ΡΠ²ΡΡΠ², Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ Π½Π°ΠΌ Π±ΡΠ΄ΡΠ²Π°ΡΠΈ ΡΠ° Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡΠ²Π°ΡΠΈ Π·Π°Ρ ΠΈΡΡ Π½Π°ΡΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, Π΄Π°Π½ΠΈΡ Ρ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ². Π―ΠΊΡΠΎ Π²ΠΈ ΠΌΠ°ΡΡΠ΅ ΡΡΡΠ°ΡΠ΅Π³ΡΡΠ½Π΅ Π±Π°ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΎΠ·ΡΠΌΡΡΡΠ΅ Π°ΠΊΡΡΠ°Π»ΡΠ½Ρ Π·Π°Π³ΡΠΎΠ·ΠΈ ΡΠ° Π³ΠΎΡΠΎΠ²Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ Π½Π°ΠΉΠΊΡΠ°ΡΡ ΠΏΡΠ°ΠΊΡΠΈΠΊΠΈ ΠΊΡΠ±Π΅ΡΠ·Π°Ρ ΠΈΡΡΡ β Π±ΡΠ΄Π΅ΠΌΠΎ ΡΠ°Π΄Ρ Π±Π°ΡΠΈΡΠΈ Π²Π°Ρ Ρ Π½Π°ΡΡΠΉ ΠΊΠΎΠΌΠ°Π½Π΄Ρ!
ΠΠΈΠΌΠΎΠ³ΠΈ:
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Ρ ΡΡΠ΅ΡΡ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²ΡΠ΄ 5 ΡΠΎΠΊΡΠ², Π· ΡΠΊΠΈΡ ΡΠΎΠ½Π°ΠΉΠΌΠ΅Π½ΡΠ΅ 2 ΡΠΎΠΊΠΈ Π½Π° ΠΊΠ΅ΡΡΠ²Π½ΠΈΡ Π°Π±ΠΎ Π»ΡΠ΄Π΅ΡΡΡΠΊΠΈΡ ΠΏΠΎΠ·ΠΈΡΡΡΡ .
ΠΠΎΡΠ²ΡΠ΄ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΠΉ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° Ρ Π²Π΅Π»ΠΈΠΊΠΈΡ ΠΏΡΠ΄ΠΏΡΠΈΡΠΌΡΡΠ²Π°Ρ .
ΠΠ½Π°Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, SOC 2, GDPR, PCI DSS).
ΠΠΎΡΠ²ΡΠ΄ ΡΡΠ°ΡΡΡ Π² Π°ΡΠ΄ΠΈΡΠ°Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΡ Π΄ΠΎ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ.
ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM, SOAR, EDR, SOC).
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Ρ ΠΌΠ°ΡΠ½ΠΈΠΌΠΈ ΠΏΠ»Π°ΡΡΠΎΡΠΌΠ°ΠΌΠΈ (AWS, Azure, Google Cloud) ΡΠ° ΡΡ Π½ΡΠΌΠΈ Π·Π°ΡΠΎΠ±Π°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΡΠΊΡΠ²Π°Π½Π½Ρ ΡΠΎΠ΄ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½ΠΈΡ Π½Π°Π²ΠΈΡΠΎΠΊ:
ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΎΠ±ΠΎΡΠΈ ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ², ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡ, Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠ½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· (ΡΠΎΠ½Π°ΠΉΠΌΠ΅Π½ΡΠ΅ 1 ΡΠ½ΡΡΡΡΠΌΠ΅Π½Ρ ΡΠ· Π±ΡΠ΄Ρ-ΡΠΊΠΎΡ ΠΊΠ°ΡΠ΅Π³ΠΎΡΡΡ):Firewall: Cisco ASA, Palo Alto Networks, Check Point, Fortinet.
MDM: Microsoft Intune, Jamf Pro, Kandji, VMware Workspace ONE, ManageEngine Endpoint Central.
SIEM: Splunk, IBM QRadar, ArcSight.
IDS/IPS: Snort, Suricata, Cisco Firepower.
DLP: Symantec DLP, McAfee DLP, Digital Guardian.
XDR/EDR: Crowdstrike Falcon, Carbon Black, SentinelOne.
PUM/PAM: CyberArk, BeyondTrust, Thycotic.
ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°ΡΠΎΠ±ΡΠ² Π·Π°Ρ ΠΈΡΡΡ ΠΊΡΠ½ΡΠ΅Π²ΠΈΡ ΠΏΡΠΈΡΡΡΠΎΡΠ², ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ, ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ .
ΠΠ°Π²ΠΈΡΠΊΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Ρ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉΠΠ°Π²Π΄Π°Π½Π½Ρ:
Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ Π±ΡΠ·Π½Π΅Ρ-ΡΡΠ»Π΅ΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ.
Π£ΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ» Π·Π°Π²Π΄Π°Π½Ρ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΡ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ.
ΠΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΡΠ½ΠΊΠ° ΡΠΈΠ·ΠΈΠΊΡΠ² ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° Π·Π°Ρ ΠΎΠ΄ΡΠ² ΡΠΎΠ΄ΠΎ ΡΡ ΠΌΡΠ½ΡΠΌΡΠ·Π°ΡΡΡ.
ΠΠΎΠ½ΡΡΠΎΠ»Ρ Π·Π° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½ΡΠΌ ΡΠ° ΠΎΠ½ΠΎΠ²Π»Π΅Π½Π½ΡΠΌ ΡΠΈΡΡΠ΅ΠΌ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ° ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° Π·Π°Π³ΡΠΎΠ·ΠΈ ΡΠ° ΡΡΡΠ½Π΅Π½Π½Ρ Π½Π°ΡΠ»ΡΠ΄ΠΊΡΠ² Π°ΡΠ°ΠΊ.
ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ ΡΠΎΠ΄ΠΎ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
Π‘ΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ ΡΠ° Π·ΠΎΠ²Π½ΡΡΠ½ΡΠΌΠΈ Π°ΡΠ΄ΠΈΡΠΎΡΠ°ΠΌΠΈ, ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π΄ΠΎ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ ΡΠ° ΠΏΠ΅ΡΠ΅Π²ΡΡΠΎΠΊ.
ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ SIEM, SOC, ΡΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ ΡΠΈΡΡΠ΅ΠΌ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ Π·Π°Π³ΡΠΎΠ·.
Π£ΡΠ°ΡΡΡ Ρ ΡΠΎΡΠ΅Π½Π·ΡΠΊ ΡΠΎΠ·ΡΠ»ΡΠ΄ΡΠ²Π°Π½Π½ΡΡ ΡΠ° Π°Π½Π°Π»ΡΠ· ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
Π ΠΎΠ±ΠΎΡΡ Π² ΠΊΠΎΠΌΡΠΎΡΡΠ°Π±Π΅Π»ΡΠ½ΠΎΠΌΡ ΠΎΡΡΡΡ UNIT.City (ΠΠΈΡΠ²) Π°Π±ΠΎ ΠΠ°ΡΡΠ°Π²Π°. ΠΡΡΡ ΠΎΠ±Π»Π°ΡΡΠΎΠ²Π°Π½ΠΈΠΉ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ ΡΠ° Π±ΠΎΠΌΠ±ΠΎΡΡ ΠΎΠ²ΠΈΡΠ΅ΠΌ.
ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ Π·Ρ ΡΡΠ°Π±ΡΠ»ΡΠ½ΠΎΡ ΠΎΠΏΠ»Π°ΡΠΎΡ ΡΠ° Π²ΡΡΠΌΠ° Π³Π°ΡΠ°Π½ΡΡΡΠΌΠΈ ΠΡΡ.City ΡΠ΅Π·ΠΈΠ΄Π΅Π½ΡΠ°.
ΠΠ½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ Π±Π΅Π· ΠΏΡΠΈΠ²βΡΠ·ΠΊΠΈ Π΄ΠΎ ΡΠΎΠ±ΠΎΡΠΈΡ Π³ΠΎΠ΄ΠΈΠ½.
ΠΠ°Π½ΡΡΡΡ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ.
ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ.
ΠΡΠ°ΠΉΠ²ΠΎΠ²Ρ ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ° zero bullshit culture.
-
Β· 22 views Β· 1 application Β· 1d
Middle Anti-Fraud manager
Full Remote Β· Worldwide Β· Product Β· 3 years of experience Β· Upper-IntermediateResponsibilities: Establish and lead the anti-fraud department, including recruiting, training, and managing a team of fraud analysts. Develop and implement robust processes for reviewing player activity before payouts, ensuring compliance with...- Responsibilities:
Establish and lead the anti-fraud department, including recruiting, training, and managing a team of fraud analysts. - Develop and implement robust processes for reviewing player activity before payouts, ensuring compliance with established rules and policies.
- Set up and optimize tools and systems to detect, analyze, and prevent fraudulent activity.
- Collaborate with payment, compliance, and support teams to handle escalated cases and improve overall operational security.
- Monitor player behavior and trends to identify potential fraud patterns and adjust preventive measures accordingly.
- Define and track key performance indicators (KPIs) for the department to ensure efficiency and effectiveness.
- Conduct regular audits and reviews of processes to identify areas for improvement and implement best practices.
- Stay updated on industry trends, fraud tactics, and technological advancements to continuously enhance the departmentβs capabilities.
- Provide regular reports on department performance, fraud incidents, and implemented solutions to stakeholders.
- Establish and enforce clear rules and guidelines for payout approvals to minimize fraud risks.
Required Skills:
- Proven experience in building and managing anti-fraud teams, preferably in the iGaming.
- Deep understanding of fraud prevention tools, systems, and best practices.
- Analytical mindset with expertise in data analysis and pattern recognition to identify fraudulent activities.
- Experience in implementing anti-fraud measures tailored to payouts and player activity reviews.
- Knowledge of U.S. regulations and compliance requirements is an advantage.
What We Offer: - The opportunity to build a department from the ground up and shape its future.
- A collaborative and innovative work environment focused on growth and success.
- Competitive salary.
The chance to make a significant impact on a high-profile project in a key market.
- Responsibilities:
-
Β· 7 views Β· 0 applications Β· 1d
WEB Assessment Engineer
Ukraine Β· Product Β· 3 years of experience Β· IntermediateSamsung R&D Institute Ukraine is looking for a passionate and collaborative WEB Security Assessment engineer to join our team. You will be involved in preventive security review and penetration testing of our online solutions in use by hundreds of...Samsung R&D Institute Ukraine is looking for a passionate and collaborative WEB Security Assessment engineer to join our team.
You will be involved in preventive security review and penetration testing of our online solutions in use by hundreds of millions of users worldwide.
If you love working directly on consumer-facing products we are glad to meet you at our team of professionals in Samsung R&D Institute Ukraine.
More specifically you will:
- perform vulnerability assessments of Samsung online services
- make blackbox penetration testing of production WEB services and server infrastructure
- make blackbox/greybox security validation of cloud infrastructure
- make blackbox penetration testing of enterprise IT infrastructure
- engage in emerging threats research: new attack methods, threat modelling, security bug hunting
Major Requirements:
- BlackBox and WhiteBox WEB pen.testing and vulnerability assessment experience
- BlackBox pen.test experience of cloud infrastructures and services
- OWASP Top-10: understanding of common Web Application vulnerabilities
- DB: understanding of database operation (pref. PostgreSQL, MongoDB, MySQL, SQLite, MS SQL)
- technical English (strong reporting skills, ability to communicate with colleagues worldwide)
Optional Requirements:
- security background (relevant University education, relevant prior employment, community activities, CTF participation)
- cryptography: understanding of crypto primitives and protocols (SSL/TLS, authentication & authorization protocols, crypto algs.)
- strong understanding of REST, SOAP operation
- pen.test experience of solutions hosted on popular cloud platforms (Alibaba, GCP, Azure, AWS)
- toolset: hands-on experience with Burp, scripting (Python), assessment automation tools (fuzz, scan)
- network security: understanding of WAF, CDN, IPS/IDS operation and weaknesses
- understanding of Devices-to-Cloud Services assessment principles
- understanding of OSINT tools and techniques
Working Conditions:
- official employment - GIG contract
- remote work is possible as well as work in Kyiv office
Benefits:
- competitive salary, annual salary review, annual bonuses
- paid 28 work days of annual vacations and sick leaves
- opportunity to become an inventor of international patents with paid bonuses
- medical & life insurance for employees and their children
- paid lunches
- discounts to Samsung products, services
- regular education and self-development on internal courses and seminars
- hybrid work format, working in office is required for some tasks
More -
Β· 6 views Β· 0 applications Β· 1d
Software Penetration Tester
Ukraine Β· Product Β· 3 years of experience Β· IntermediateVulnerability assessment and penetration testing of various Linux OS security components and mechanisms: - vulnerability assessment of Samsung mobile security software: security source code review (white box) and binary analysis (black box) - secure...Vulnerability assessment and penetration testing of various Linux OS security components and mechanisms:
- vulnerability assessment of Samsung mobile security software: security source code review (white box) and binary analysis (black box)
- secure SDLC process support (including requirements, design security review)
- emerging threats research: new attack methods, (un)known security issues risks
Major Requirements:
- 2+ years of hands-on experience with white and black box software penetration testing and vulnerability assessment
- understanding of typical software security issues (memory corruptions, various injections, arithmetic overflows, etc.) and how to protect against them
- good experience with C/C++, scripting languages, assembly (Arm preferred)
- ability to document and describe discovered security issues
Optional Requirements:
- exploitation experience
- understanding of Linux security architecture and design flaws exploitation (privilege escalation, MAC/DAC Passover oth.).
- Rust language knowledge
- tools: experience with fuzzers, disassemblers, debuggers, assessment automation tools
- cryptography: exploitation experience (weak keys, bruteforce, weak crypto, etc.)
- experience with assessing protected solutions (obfuscated / packed code)
Working Conditions:
- official employment - GIG contract
- remote work is possible as well as work in Kyiv office
Benefits:
- competitive salary, annual salary review, annual bonuses
- paid 28 work days of annual vacations and sick leaves
- opportunity to become an inventor of international patents with paid bonuses
- medical & life insurance for employees and their children
- paid lunches
- discounts to Samsung products, services
- regular education and self-development on internal courses and seminars
- hybrid work format, working in office is required for some tasks
More -
Β· 11 views Β· 2 applications Β· 1d
Senior information security engineer to $5000
Office Work Β· Ukraine (Kyiv) Β· 3 years of experienceΠΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ²: ΠΠΈΡΠ° ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΎΡΠ²ΡΡΠ° Π°Π±ΠΎ Π·Π°ΠΊΡΠ½ΡΠ΅Π½Π½Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΊΡΡΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΠΠ ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 3 ΡΠΎΠΊΡΠ² Π² Π³Π°Π»ΡΠ·Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ (ΠΏΡΠΎΠ΅ΠΊΡΡΠ²Π°Π½Π½Ρ/Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ) Industrial Cyber Security Solutions ΠΠ½Π°Π½Π½Ρ...ΠΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ²:
- ΠΠΈΡΠ° ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΎΡΠ²ΡΡΠ° Π°Π±ΠΎ Π·Π°ΠΊΡΠ½ΡΠ΅Π½Π½Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΊΡΡΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΠΠ
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 3 ΡΠΎΠΊΡΠ² Π² Π³Π°Π»ΡΠ·Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
- ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ (ΠΏΡΠΎΠ΅ΠΊΡΡΠ²Π°Π½Π½Ρ/Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ) Industrial Cyber Security Solutions
- ΠΠ½Π°Π½Π½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ IT-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ SIEM, VPN, Firewall ΡΠ° ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ
- ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΡΠ² ΡΠ° ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, COBIT, CIT)
- ΠΠ°Π²ΠΈΡΠΊΠΈ ΡΠΎΠ±ΠΎΡΠΈ Π· Π°Π½ΡΠΈΠ²ΡΡΡΡΠ°ΠΌΠΈ, DLP, IDM, FIM ΡΠ° PAM, IPS/IDS ΡΡΡΠ΅Π½Π½ΡΠΌΠΈ
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅ΡΡΡΡΠ°ΠΌΠΈ Π‘Π£ΠΠ (asset management) ΡΠ° MDM ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ
Π‘Π΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ (Π±ΡΠ΄ΡΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ): CISSP, CISA, CISM, CEH, CHFI.
ΠΠ»ΡΡΠΎΠ²Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ ΠΏΠΎΡΠ°Π΄ΠΈ:
- Π‘ΡΠ²ΠΎΡΠ΅Π½Π½Ρ Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π»Ρ Π·Π°Ρ ΠΈΡΡΡ ΠΊΠΎΠ½ΡΡΠ΄Π΅Π½ΡΡΠΉΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° ΠΊΠ»ΡΡΠ½ΡΡΠ²
- ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM, IDS/IPS, DLP, MDM, Π°Π½Π°Π»ΡΡΠΈΠΊΠ° Π»ΠΎΠ³ΡΠ² Π½Π°ΠΏΡ - Wazuh, Surikata)
- Π£ΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΡΠ±Π΅ΡΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ. ΠΠΎΡΡΠΊ, Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ° ΠΎΠ±ΡΠΎΠ±ΠΊΠ° Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ²
- ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡΠ½ΠΈΡ ΡΡΡΠ΅Π½Ρ Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ² ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π»Ρ Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ
- ΠΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΈΡ Pentest ΠΏΠ΅ΡΠΈΠΌΠ΅ΡΡΠ°
- Π‘ΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ IT-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
- ΠΠ°Π²ΡΠ°Π½Π½Ρ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ ΠΎΡΠ½ΠΎΠ²Π°ΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
-
Β· 17 views Β· 1 application Β· 4d
Active Directory Engineer β Identity and Access Management
Full Remote Β· Countries of Europe or Ukraine Β· 8 years of experience Β· IntermediateRequirements: Bachelor's or Master's degree in Computer Science, Electrical Engineering, Information Systems, or a related field. 8+ years of development experience focused on identity and access management systems. Hands-on experience with programming...Requirements:
- Bachelor's or Master's degree in Computer Science, Electrical Engineering, Information Systems, or a related field.
- 8+ years of development experience focused on identity and access management systems.
- Hands-on experience with programming languages and automation tools (C#, .NET, Ansible, Python, Java, Go, Node.js, Terraform, Docker, etc.).
- Experience with Active Directory or similar systems.
- Experience integrating with Microsoft Active Directory or comparable third-party systems.
- Development experience in hybrid cloud environments.
- Strong cross-functional communication skills for technical and non-technical audiences.
- Experience working with multiple vendors in the identity and access management ecosystem.
Nice-to-Have:
- Familiarity with cloud security best practices and certificate infrastructure.
- Experience with container orchestration and microservices architectures.
- Knowledge of Single Sign-On (SSO), multi-factor authentication, and identity federation.
- Experience with continuous integration/continuous deployment (CI/CD) pipelines.
- Exposure to agile development methodologies and DevOps practices.
Key Responsibilities:
- Integrate identity data from corporate systems and enforce roles and policies to control access to critical resources.
- Implement features such as JIT, JML, PIM, PAM, and RBAC.
- Collaborate with security, compliance, and engineering teams to ensure proper logging and auditing of access activities.
- Design, develop, and operate identity management systems across infrastructure in both private and public clouds.
- Monitor industry trends and adopt new tools and features as needed.
- Mentor junior engineers and participate in on-call rotations.
About the Project:
We are seeking an experienced Active Directory Engineer specializing in Identity and Access Management to enhance product infrastructure security. The role involves managing user identities, governing access to production systems, and automating security processes to ensure seamless and secure access management for engineers and operations personnel. The team collaborates cross-functionally to build scalable solutions that integrate with compliance and security requirements.
More -
Β· 28 views Β· 3 applications Β· 4d
Information Security Consultant / Auditor
Ukraine Β· Product Β· 5 years of experience Β· Upper-IntermediateThis vacancy is only for Ukrainian residents within Ukraine. We invite an experienced Information Security Consultant / Auditor to join our team. This position might be a good fit if you want to analyse and improve information security processes in...This vacancy is only for Ukrainian residents within Ukraine.
We invite an experienced Information Security Consultant / Auditor to join our team. This position might be a good fit if you want to analyse and improve information security processes in modern technological companies.
As a company specialising in data security solutions, our products are well-known amongst security-aware teams worldwide and are popular for easily solving complicated security challenges. Apart from building βoff-the-shelfβ solutions, we design custom security controls for novel problems and handle mission-critical, multi-app, multi-platform distributed systems, addressing serious issues in the world around us.
We work in the B2B space with customers such as power grid operators, payment processors, legal companies, and million-user customer applications.
Responsibilities:
- Understand the cybersecurity posture of technological organisations and guide them towards improvements.
- Conduct risk assessment and gap analysis for us and our clients: analyse risk posture, define sensitive assets, describe top risks & threats, identify gaps in security controls coverage, suggest missing controls and policies. Think NIST RMF, NIST SP 800-53.
- Outline organisation-wide and product-wide security roadmaps and plans.
- Lead cybersecurity programme (improving security posture) for our clients.
- Select and insist on security controls that would mitigate high-priority risks (NIST SP 800-53).
- Design and draft security policies, procedures, standards and controls in line with regulations and/or relevant standards. Think ISO27K, NIST CSF, SOC 2.
- Maintain and review ISMS documentation, suggest improvements.
- Maintain control documentation for relevant risk areas and business/technology processes.
Requirements:
- 5+ years of experience working as a risk & compliance auditor, information security officer, cybersecurity consultant, or in a similar role.
- Sound understanding of industry standards in cybersecurity (NIST, ISO, ITIL, ISF).
- Strong understanding of security and information security controls: which ones solve which problems.
- Good understanding of industry standards in privacy (GDPR, ISO 27018).
- Advanced knowledge of IT general controls (security, change management, disaster backup recovery, data centre, infrastructure, etc.) and IT governance processes (ITIL).
- Bachelorβs or Masterβs degree in Computer Science, Cybersecurity, IT Auditing, Information Systems.
- Upper-intermediate English, written and spoken.
- Ability to work independently and as part of a team in a fast-paced environment.
Nice to have:
- In-depth technical understanding of information security, IoT and hardware, systems engineering, infrastructure, etc.
- Understanding of how large distributed systems are built or how they work. Think power plant control systems at country-scale.
- Desire to work on extremely innovative projects.
- Experience working in a multicultural context.
Hiring Process:
- Test task
- Introduction call
- Technical interview
- Offer
Whatβs in it for you?
- Competitive compensation with bonuses
- Hybrid work model: this position allows for a combination of in-office and remote work as needed
- Paid vacation β 21 business days per year
- Paid sick leave
- Work at the intersection of cryptography, software engineering, and information security
- Opportunity to contribute to mission-critical projects
- Reimbursement for courses, certifications, and books
-
Β· 31 views Β· 4 applications Β· 4d
Information Security Manager
Worldwide Β· 3 years of experience Β· Upper-IntermediateJoin our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clientsβ digital assets. Responsibilities: Implement security measures in alignment with industry frameworks. Conduct security...Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clientsβ digital assets.
Responsibilities:
- Implement security measures in alignment with industry frameworks.
- Conduct security assessments for client projects using established methodologies and provide actionable recommendations.
- Collaborate with development teams to identify risks and implement the most efficient security solutions.
- Promote security services by engaging with clients and presenting solutions.
Requirements:
- 3+ years of experience with security frameworks such as ISO 27001, SOC 2, or NIST CSF.
- Knowledge of cloud security, with practical experience, is a plus.
- Understanding of Secure SDLC and software security architecture is a plus.
- Ability to engage clients and provide expert security consulting.
- A structured approach to work and clear documentation skills.
- Ability to automate tasks using any programming language and AI tools.
- Upper-Intermediate English or higher.
Our benefits:
GROWTH & EDUCATION
- Individual development plan.
- Mentoring program.
- Evaluation process.
- Professional education.
- Covering the cost of professional certifications.
- Corporate library.
- English classes.
COMMUNITY
- Technological community.
- Volunteering & Charity.
- Yalantis events.
- Yalantis Education.
- Project team building activities.
WELLBEING
- Medical insurance, health check-ups, and compensation for sports activities are up to you.
- Vacation & Days Off.
- Mental health support program.
- Public holidays.
- Financial and legal support for private entrepreneurs.
WORK ENVIRONMENT
- Cozy offices (Dnipro, Kyiv, Warsaw).
- Corporate Top-notch equipment and quality tools.
- Flexible format of work.
- Eco & Pet-friendly space.
- Fun activities in offices.
- Y-bucks & Yalantis store.
-
Β· 19 views Β· 0 applications Β· 4d
Linux Kernel Developer
Ukraine Β· Product Β· 3 years of experience Β· IntermediateSamsung R&D Institute Ukraine is looking for a passionate and collaborative Linux Kernel Developer to join our team in Kyiv. You will work with security and system development engineers tackling real-world tasks with Samsung flagships, introduce patches...Samsung R&D Institute Ukraine is looking for a passionate and collaborative Linux Kernel Developer to join our team in Kyiv.
You will work with security and system development engineers tackling real-world tasks with Samsung flagships, introduce patches to the Kernel of not-yet-released Android versions,
be involved in operating system development, learn about security model of Android and improve it on Samsung smartphones in use by hundreds of millions of users worldwide.
If you love working directly on consumer-facing products we are glad to meet you at Samsung team of professionals in Samsung R&D Institute Ukraine.
More specifically you will
- Design, develop, build, debug, test, profile Linux Kernel modules for Android devices
- Develop Kernel-level security solutions
- Participate in research activities and strategic prototyping for future Samsung products
Major Requirements
- Bachelor degree in computer science or similar
- Knowledge of C, Kernel-level development
- Building and testing Linux Kernel modules
- Knowledge of Linux Kernel architecture and operation
Optional Requirements
- Knowledge of ARM technologies: TrustZone, GIC, MMU, NEON, VFP, Thumb
- Knowledge of Linux Security architecture: MAC/DAC, SE, LSM, Android/Tizen security models
- Experience with device drivers development
- Knowledge of POSIX API
- Applied cryptography: authentication & authorization protocols, crypto algorithms
- Experience with bootloaders development / debugging
- Experience with virtualization: XeN/KVM/QEMU
- Ability to work collaboratively within teams on a set of innovative projects
- Good technical English
Benefits:
- competitive salary, annual salary review, annual bonuses
- paid 28 work days of annual vacations and sick leaves
- opportunity to become an inventor of international patents with paid bonuses
- medical & life insurance for employees and their children
- paid lunches
- discounts to Samsung products, services
- regular education and self-development on internal courses and seminars
- remote work is possible as well as work in Kyiv office
-
Β· 15 views Β· 0 applications Β· 5d
Senior/Principal AWS Cloud Security Engineer
Full Remote Β· Ukraine Β· 6 years of experience Β· Upper-IntermediateOur client is seeking a Principal AWS Cloud Security and Compliance Engineer with extensive hands-on experience in securing cloud environments at scale. This role is ideal for a seasoned security expert who thrives on designing, implementing, and managing...Our client is seeking a Principal AWS Cloud Security and Compliance Engineer with extensive hands-on experience in securing cloud environments at scale. This role is ideal for a seasoned security expert who thrives on designing, implementing, and managing cloud security controls, ensuring compliance with industry standards, and mitigating security risks across AWS infrastructure. The ideal candidate will bring a deep understanding of AWS security services, regulatory compliance frameworks, and cloud-native security best practices.
Main tasks and responsibilities:
- Security Architecture & Design: Lead the design and implementation of secure AWS architectures, ensuring compliance with security frameworks and industry best practices
- Governance & Compliance: Develop, enforce, and monitor compliance with SOC 2, ISO 27001, NIST, CIS, FedRAMP, PCI-DSS, HIPAA, and other security standards
- Cloud Security Operations: Implement and manage AWS security services such as AWS IAM, AWS KMS, AWS GuardDuty, AWS Security Hub, AWS Macie, AWS Config, AWS WAF, and AWS Shield
- Threat Detection & Incident Response: Develop SIEM integrations, monitor security logs, investigate incidents, and lead incident response efforts to mitigate threats
- Automation & Infrastructure Security: Implement Infrastructure as Code (IaC) security policies using Terraform, AWS CloudFormation, or AWS CDK. Automate security monitoring and compliance reporting
- Identity & Access Management (IAM): Define and enforce least privilege access controls, manage AWS Organizations and Service Control Policies (SCPs)
- DevSecOps & CI/CD Security: Embed security into the CI/CD pipeline, ensuring secure deployment practices across cloud workloads
- Security Risk Assessments: Perform cloud security risk assessments, threat modeling, and penetration testing to identify and mitigate vulnerabilities
- Security Awareness & Training: Mentor engineering teams on secure coding, cloud security best practices, and AWS security controls
Stakeholder Collaboration: Work with engineering, compliance, and business teams to align security strategies with organizational goals
Education, skills and experience:
Must have:
- 10+ years of hands-on experience in cybersecurity, cloud security, and compliance, with at least 5 years in AWS security
- Expert-level knowledge of AWS security services, architecture, and best practices. Deep understanding of compliance frameworks (e.g., SOC 2, ISO 27001, NIST, FedRAMP, PCI-DSS, HIPAA)
- Experience with AWS IAM, VPC security, AWS WAF, KMS, CloudTrail, Config, Security Hub, Macie, and GuardDuty
- Proficiency in SIEM solutions, security automation, and cloud-native security tools
- Hands-on experience with IaC security (Terraform, CloudFormation), container security (EKS, ECS), and serverless security
- Strong background in DevSecOps, securing CI/CD pipelines, and integrating security into cloud-native development
- Expertise in identity & access management (IAM), RBAC, MFA, and Zero Trust security models
- Experience with incident response, threat detection, and forensic analysis in AWS
- Proficient in scripting and automation (Python, Bash, or PowerShell)
- Strong communication skills with the ability to influence technical and non-technical stakeholders
Would be a plus:
- AWS Certified Security β Specialty or AWS Certified Solutions Architect β Professional certification
- Experience in multi-cloud security (AWS, Azure, GCP)
- Familiarity with security risk management frameworks (e.g., MITRE ATT&CK, OWASP, CIS Benchmarks)
- Knowledge of AI/ML security, API security, and data protection strategies
-
Β· 68 views Β· 8 applications Β· 6d
Security Operations
Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 2 years of experienceWe are bill_line β a fintech company with global focus. Born in Ukraine, weβre steamrolling the world of payments all over the world. Our main product is a payment solution for any online business, and weβre polishing it to perfection every single day....We are bill_line β a fintech company with global focus. Born in Ukraine, weβre steamrolling the world of payments all over the world.
Our main product is a payment solution for any online business, and weβre polishing it to perfection every single day. Any business that needs to accept payments is a bill_line partner: from a small online store to banks, insurance companies or charities.
Why us?
bill_line is a βswiss army knifeβ in the world of fintech for any client. This means our bizdev, support, legal and finance departments are always with our merchant β from a connection request to integration and transaction support.
Weβre proud of our approach and its results. But every success is a puzzle, and only the best team in the world can put all its pieces together. Do you want to be a part of it and change the Ukrainian and international fintech market? Then send us your CV, and we will consider it and definitely write back to you!
Key Responsibilities:- Ensure compliance with legal requirements, including the Information Security and Cybersecurity Law.
- Oversee cybersecurity and information security measures throughout the lifecycle of protected systems (design, implementation, operation, decommissioning).
- Develop and implement information security policies, standards, and related documentation.
- Monitor and investigate cybersecurity incidents and security breaches, particularly those impacting payment services.
- Manage and maintain the functionality of information protection tools, ensuring timely recovery in case of failures.
- Control the integrity and composition of hardware and software in information systems, preventing unauthorized or unapproved use.
- Review and approve changes to IT systems, ensuring compliance with Ukrainian laws and security requirements of payment systems.
- Organize training and upskilling for employees involved in cybersecurity and information security processes.
- Conduct regular cybersecurity awareness training and workshops for all employees.
What Weβre Looking For:
- Education: A degree in Information Security, Cybersecurity, IT, or related fields.
- Experience: 2β3+ years in cybersecurity or information security roles.
- Knowledge: Strong understanding of Ukrainian cybersecurity regulations and international standards (e.g., ISO/IEC 27001, NIST).
- Technical Skills: Experience with cybersecurity tools, incident investigation, and security monitoring systems.
- Policy Development: Proven ability to create and implement security policies and protocols.
- Training: Skilled in organizing and delivering training sessions for employees.
- Certifications (Preferred): CISSP, CISM, CEH, or similar are a plus.
- Personal Qualities: Analytical mindset, responsibility, and ability to multitask in a dynamic environment.
π‘What we offer
πOur HQ is in invincible Kyiv, near the Zvirynetska metro station. We also have a cool EU office if youβre relocated.
π¨βπ»You will instantly have everything you need to work (the best equipment, necessary subscription services and everything that will make you effective)
β‘Remote work
ποΈWe have 24 days of paid vacation. If you are a workaholic and have not used it, weβll compensate you with money;
πWe pay sick leave in full.
π₯ Corporate lunches.
π©βπ¬Mandatory health insurance
π§ββοΈSessions with psychologists - we support mental health
π‘ How we have fun
The best team is our main asset and a reason for pride. Your future colleagues love active recreations, sharing impressions of a movie or listening to their favorite music together. We often end the working week with fun Friday mini-parties with colleagues.
π‘ People care
Our internal corporate culture is based on caring: we support each other, and the company helps colleagues to grow professionally.
We care about the health of our colleagues and hold Health Days.
π‘ Training and development
We regularly participate in top international fintech, e-commerce, crypto conferences, meetings.
We pay for training (courses, trainings, seminars) for professional growth and team development.
We support you in learning English or other languages, especially for expansion into new markets!
More