Jobs
69-
Β· 1 view Β· 0 applications Β· 30m
Senior information security engineer
Office Work Β· Ukraine (Kyiv) Β· Product Β· 3 years of experienceΠΠ°ΡΠΊΠ΅ΡΠΈΠ½Π³ΠΎΠ²Π° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π² ΠΏΠΎΡΡΠΊΠ°Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΠ° Π½Π° ΠΏΠΎΠ·ΠΈΡΡΡ ΠΠΎΠ»ΠΎΠ²Π½ΠΈΠΉ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. ΠΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ²: -ΠΠΈΡΠ° ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΎΡΠ²ΡΡΠ° Π°Π±ΠΎ Π·Π°ΠΊΡΠ½ΡΠ΅Π½Π½Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΊΡΡΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΠΠ -ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 3 ΡΠΎΠΊΡΠ² Π² Π³Π°Π»ΡΠ·Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ...ΠΠ°ΡΠΊΠ΅ΡΠΈΠ½Π³ΠΎΠ²Π° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π² ΠΏΠΎΡΡΠΊΠ°Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΠ° Π½Π° ΠΏΠΎΠ·ΠΈΡΡΡ ΠΠΎΠ»ΠΎΠ²Π½ΠΈΠΉ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈΠΌΠΎΠ³ΠΈ Π΄ΠΎ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ²:
-ΠΠΈΡΠ° ΡΠ΅Ρ Π½ΡΡΠ½Π° ΠΎΡΠ²ΡΡΠ° Π°Π±ΠΎ Π·Π°ΠΊΡΠ½ΡΠ΅Π½Π½Ρ ΡΠΏΠ΅ΡΡΠ°Π»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΊΡΡΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΠΠ
-ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 3 ΡΠΎΠΊΡΠ² Π² Π³Π°Π»ΡΠ·Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
-ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ (ΠΏΡΠΎΠ΅ΠΊΡΡΠ²Π°Π½Π½Ρ/Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ) Industrial Cyber Security Solutions
-ΠΠ½Π°Π½Π½Ρ ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΡΠ² Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ IT-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ SIEM, VPN, Firewall ΡΠ° ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΠΈ ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ
-ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊΡΠ² ΡΠ° ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, COBIT, CIT)
-ΠΠ°Π²ΠΈΡΠΊΠΈ ΡΠΎΠ±ΠΎΡΠΈ Π· Π°Π½ΡΠΈΠ²ΡΡΡΡΠ°ΠΌΠΈ, DLP, IDM, FIM ΡΠ° PAM, IPS/IDS ΡΡΡΠ΅Π½Π½ΡΠΌΠΈ
-ΠΠΎΡΠ²ΡΠ΄ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ΅ΡΡΡΡΠ°ΠΌΠΈ Π‘Π£ΠΠ (asset management) ΡΠ° MDM ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ*Π‘Π΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ: CISSP, CISA, CISM, CEH, CHFI (Π±ΡΠ΄ΡΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ).
More
ΠΠ»ΡΡΠΎΠ²Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ ΠΏΠΎΡΠ°Π΄ΠΈ:
-Π‘ΡΠ²ΠΎΡΠ΅Π½Π½Ρ Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π΄Π»Ρ Π·Π°Ρ ΠΈΡΡΡ ΠΊΠΎΠ½ΡΡΠ΄Π΅Π½ΡΡΠΉΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° ΠΊΠ»ΡΡΠ½ΡΡΠ²
-ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° Π°Π΄ΠΌΡΠ½ΡΡΡΡΡΠ²Π°Π½Π½Ρ ΡΠΈΡΡΠ΅ΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM, IDS/IPS, DLP, MDM, Π°Π½Π°Π»ΡΡΠΈΠΊΠ° Π»ΠΎΠ³ΡΠ² Π½Π°ΠΏΡ - Wazuh, Surikata)
-Π£ΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΡΠ±Π΅ΡΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ. ΠΠΎΡΡΠΊ, Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΡΠ° ΠΎΠ±ΡΠΎΠ±ΠΊΠ° Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠ΅ΡΡΡΡΡΠ²
-ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡΠ½ΠΈΡ ΡΡΡΠ΅Π½Ρ Ρ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ² ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π»Ρ Π·Π°Ρ ΠΈΡΡΡ Π΄Π°Π½ΠΈΡ
-ΠΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΈΡ Pentest ΠΏΠ΅ΡΠΈΠΌΠ΅ΡΡΠ°
-Π‘ΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ IT-Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
-ΠΠ°Π²ΡΠ°Π½Π½Ρ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ ΠΎΡΠ½ΠΎΠ²Π°ΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Π©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
-ΠΠ½Π΄ΠΈΠ²ΡΠ΄ΡΠ°Π»ΡΠ½Ρ ΡΠΌΠΎΠ²ΠΈ ΠΎΠΏΠ»Π°ΡΠΈ Π·Π° ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠ°ΠΌΠΈ ΡΠΏΡΠ²Π±Π΅ΡΡΠ΄ΠΈ
-Π ΠΎΠ±ΠΎΡΠ° Π² ΠΊΠΎΠΌΡΠΎΡΡΠ½ΠΎΠΌΡ ΠΎΡΡΡΡ Π² ΡΠ΅Π½ΡΡΡ ΠΠΈΡΠ²Ρ
ΠΠΆΠ΅ ΡΠ΅ΠΊΠ°ΡΠΌΠΎ Π½Π° Π²Π°Ρ Π²ΡΠ΄Π³ΡΠΊ) -
Β· 5 views Β· 0 applications Β· 1h
Anti-Fraud Specialist
Full Remote Β· Worldwide Β· Product Β· 3 years of experience Β· IntermediateJarvisHeart is a rapidly expanding global IT & Tech company based in Cyprus, dedicated to its team, providing an inspiring dynamic work culture. Established in 2024, we are aimed to deliver services and solutions for businesses. We attract and retain the...JarvisHeart is a rapidly expanding global IT & Tech company based in Cyprus, dedicated to its team, providing an inspiring dynamic work culture.
Established in 2024, we are aimed to deliver services and solutions for businesses. We attract and retain the best IT professionals, offering avenues for development and progress to provide exceptional solutions to clients around the globe. Join us and become a part of JarvisHeartβs success story.
We are seeking a highly skilled Anti-Fraud Supervisor to spearhead fraud detection efforts. The ideal candidate will have a strong background in fraud prevention, risk management, and team leadership. This role offers growth opportunities, including progression to a Team Lead position.
Key Responsibilities:
- Fraud Detection & Prevention: Monitor and analyze activities to identify suspicious behavior and potential fraud.
- Risk Assessment: Implement and refine risk management strategies.
- Team Collaboration: Work closely with team members to ensure alignment on fraud prevention goals.
- Process Improvement: Develop and optimize verification methods and procedures.
- Reporting: Provide detailed reports and feedback on fraudulent activities to stakeholders.
Required Qualifications:
- 3+ years of experience in fraud prevention, risk management, or a related field.
- Proficiency in English (French is a plus).
- Familiarity with SCRUM or Agile methodologies.
- Strong analytical and problem-solving skills.
- Ability to work in a fast-paced, high-pressure environment.
Optional Qualifications:
- Experience with international fraud prevention strategies.
- Knowledge of compliance requirements in Canada and Europe.
What we offer:
- 17 vacation days (Enjoy vacation policy to recharge and explore. We believe work-life balance is key to personal and professional well-being.)
- 15 paid sick days (Your health matters. We offer paid sick leave to ensure you can recover without financial stress)
- Insurance after the probation period (Your well-being is our priority. After completing the probationary period, youβll gain access to our comprehensive insurance plan to support your health and peace of mind.)
- Public holidays off (Take time to celebrate and enjoy national holidays with friends and family without worrying about work.)
- Work equipment provided (Start your journey with the best tools for success! We provide all the necessary equipment to help you work efficiently and comfortably.)
If youβre ready to take on this exciting challenge and contribute to a fast-growing industry, apply now!
More -
Β· 1 view Β· 0 applications Β· 2h
Presale ΠΊΠΎΠ½ΡΡΠ»ΡΡΠ°Π½Ρ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
Office Work Β· Ukraine (Kyiv) Β· 2 years of experience Β· Pre-IntermediatePresale ΠΊΠΎΠ½ΡΡΠ»ΡΡΠ°Π½Ρ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ IT-Solutions β ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠΈΡΡΠ΅ΠΌΠ½ΠΈΠΉ ΡΠ½ΡΠ΅Π³ΡΠ°ΡΠΎΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ, ΡΠΊΠΈΠΉ Π²ΠΆΠ΅ ΠΏΠΎΠ½Π°Π΄ 15 ΡΠΎΠΊΡΠ² Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡ ΡΡΡΠ°ΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΠΠ’-ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ, Π½Π°Π΄Π°Ρ ΠΏΠΎΡΠ»ΡΠ³ΠΈ Π² ΡΡΠ΅ΡΡ ΠΠ’-ΠΊΠΎΠ½ΡΠ°Π»ΡΠΈΠ½Π³Ρ ΡΠ° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. ΠΠΈΠΊΠΎΠ½ΡΡ...Presale ΠΊΠΎΠ½ΡΡΠ»ΡΡΠ°Π½Ρ Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
IT-Solutions β ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠΈΡΡΠ΅ΠΌΠ½ΠΈΠΉ ΡΠ½ΡΠ΅Π³ΡΠ°ΡΠΎΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ, ΡΠΊΠΈΠΉ Π²ΠΆΠ΅ ΠΏΠΎΠ½Π°Π΄ 15 ΡΠΎΠΊΡΠ² Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΡ ΡΡΡΠ°ΡΠ½Ρ ΡΡΡΠ΅Π½Π½Ρ Π΄Π»Ρ ΠΠ’-ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ, Π½Π°Π΄Π°Ρ ΠΏΠΎΡΠ»ΡΠ³ΠΈ Π² ΡΡΠ΅ΡΡ ΠΠ’-ΠΊΠΎΠ½ΡΠ°Π»ΡΠΈΠ½Π³Ρ ΡΠ° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ. ΠΠΈΠΊΠΎΠ½ΡΡ Π·Π°ΠΌΠΎΠ²Π»Π΅Π½Π½Ρ Π΄Π»Ρ Π²Π΅Π»ΠΈΠΊΠΈΡ ΠΊΠΎΠΌΠ΅ΡΡΡΠΉΠ½ΠΈΡ Ρ Π΄Π΅ΡΠΆΠ°Π²Π½ΠΈΡ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΠΉ.
ΠΠ°ΠΏΡΠΎΡΡΡΠΌΠΎ Π² ΡΠ²ΠΎΡ ΠΊΠΎΠΌΠ°Π½Π΄Ρ Presale ΠΊΠΎΠ½ΡΡΠ»ΡΡΠ°Π½ΡΠ° Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
ΠΡΠ½ΠΎΠ²Π½Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ:
- Π΅ΠΊΡΠΏΠ΅ΡΡΠ½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΠ° ΠΌΠ΅Π½Π΅Π΄ΠΆΠ΅ΡΡΠ² Π· ΠΏΡΠΎΠ΄Π°ΠΆΡΠ², Π²ΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ ΠΏΠΎΡΡΠ΅Π± Π·Π°ΠΌΠΎΠ²Π½ΠΈΠΊΠ° Π·Π° Π½Π°ΠΏΡΡΠΌΠΎΠΌ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Π° Π±Π΅Π·ΠΏΠ΅ΠΊΠ°;
- ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΡΡΡΠ΅Π½Ρ Ρ ΡΠ°ΠΌΠΊΠ°Ρ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΈΡ ΠΏΡΠΎΡΠΊΡΡΠ²;
- ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΡΠΏΠ΅ΡΠΈΡΡΠΊΠ°ΡΡΠΉ ΡΠ° ΠΊΠΎΠΌΠ΅ΡΡΡΠΉΠ½ΠΈΡ ΠΏΡΠΎΠΏΠΎΠ·ΠΈΡΡΠΉ;
- ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° ΡΠ° Π°Π½Π°Π»ΡΠ· ΡΠ΅Π½Π΄Π΅ΡΠ½ΠΎΡ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ;
- ΡΠ΅Ρ Π½ΡΡΠ½Π΅ Π½Π°Π²ΡΠ°Π½Π½Ρ, ΠΊΠΎΠ½ΡΡΠ»ΡΡΡΠ²Π°Π½Π½Ρ ΠΌΠ΅Π½Π΅Π΄ΠΆΠ΅ΡΡΠ² Π· ΠΏΡΠΎΠ΄Π°ΠΆΡΠ²;
- Π°Π½Π°Π»ΡΠ· ΡΠΈΠ½ΠΊΡ, ΡΠΎΠ±ΠΎΡΠ° Π· ΠΎΡΠ½ΠΎΠ²Π½ΠΈΠΌΠΈ Π²Π΅Π½Π΄ΠΎΡΠ°ΠΌΠΈ Π·Π° Π½Π°ΠΏΡΡΠΌΠΎΠΌ ΠΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Π° Π±Π΅Π·ΠΏΠ΅ΠΊΠ°;
- ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ ΠΏΠ°ΡΡΠ½Π΅ΡΡΡΠΊΠΈΡ Π²ΡΠ΄Π½ΠΎΡΠΈΠ½.
ΠΡΠ΄ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΠ° ΠΌΠΈ ΠΎΡΡΠΊΡΡΠΌΠΎ:
- ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 2 ΡΠΎΠΊΡΠ²;
- Π·Π½Π°Π½Π½ΡΠΌΠΈ ΡΡΠ΅Π½Π΄ΡΠ² Π² ΠΠ’-Π±Π΅Π·ΠΏΠ΅ΡΡ;
- Π·Π½Π°Π½Π½Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ΡΠΎΠ±ΠΎΡΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ ΠΠ;
- ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΠΉ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΡΡΡΠ΅Π½Ρ Ρ Π³Π°Π»ΡΠ·Ρ ΠΠ;
- Π·Π½Π°Π½Π½ΡΠΌΠΈ ΠΏΠΎΡΡΡΠ΅Π»Ρ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΡ Π²ΠΈΡΠΎΠ±Π½ΠΈΠΊΡΠ² Ρ Π³Π°Π»ΡΠ·Ρ ΠΠ;
- Π½Π°Π²ΠΈΡΠΊΠΈ ΡΠΈΡΠ°Π½Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΎΡ ΡΠ΅Ρ Π½ΡΡΠ½ΠΎΡ Π»ΡΡΠ΅ΡΠ°ΡΡΡΠΈ ΡΠ° Π½ΠΎΡΠΌΠ°ΡΠΈΠ²Π½ΠΎΡ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ;
- Π·Π½Π°Π½Π½Ρ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ ΠΌΠΎΠ²ΠΈ Π½Π° ΡΠ΅Ρ Π½ΡΡΠ½ΠΎΠΌΡ ΡΡΠ²Π½Ρ.
Π‘ΠΎΡΡ ΡΠΊΡΠ»ΠΈ:
- ΡΠ°ΠΌΠΎΠ΄ΠΎΡΡΠ°ΡΠ½ΡΡΡΡ, ΡΠ°ΠΌΠΎΠΎΡΠ³Π°Π½ΡΠ·ΠΎΠ²Π°Π½ΡΡΡΡ, Π½Π°ΡΡΠ»Π΅Π½ΡΡΡΡ Π½Π° ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ ΡΠ° ΠΏΡΠ°Π³Π½Π΅Π½Π½Ρ ΡΠΎΠ·Π²ΠΈΡΠΊΡ β ΡΠ΅ ΡΡΠ½Π΄Π°ΠΌΠ΅Π½Ρ;
- Π±ΡΡΠΈ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΠΈΠΌ Π½Π° ΡΠΎΠ±ΠΎΡΡ Π² ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΠΌΠΎΠ²Π°Ρ β ΡΠ΅ Π³Π°ΡΠ°Π½ΡΡΠ²Π°ΡΠΈ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ ΡΠ²ΠΎΡΡ ΠΏΡΠΎΡΠ΅ΡΡΠΉΠ½ΠΈΡ ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΡΠ². ΠΠΈ ΠΏΡΠ°Π³Π½Π΅ΠΌΠΎ Π±Π°ΡΠΈΡΠΈ ΡΠ΅ΡΠ΅Π΄ ΡΠ²ΠΎΡΡ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊΡΠ² Π»ΡΠ΄Π΅ΠΉ, ΡΠΊΡ Π·Π°Π²ΠΆΠ΄ΠΈ ΡΠΏΡΠ°Π²Π»ΡΡΡΡΡΡ Π· ΠΏΠΎΡΡΠ°Π²Π»Π΅Π½ΠΈΠΌΠΈ Π·Π°Π΄Π°ΡΠ°ΠΌΠΈ;
- ΠΌΠ°ΡΠΈ ΡΡΠ»Ρ Ρ Π±ΡΡΠΈ ΡΡΠ»ΡΡΠ½ΠΈΠΌ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
- Π³ΡΠ°ΡΡΠΊ ΡΠΎΠ±ΠΎΡΠΈ β 09:00-18:00, ΠΏ'ΡΡΠ½ΠΈΡΡ β ΡΠΊΠΎΡΠΎΡΠ΅Π½ΠΈΠΉ Π΄Π΅Π½Ρ Π΄ΠΎ 17:00; ΡΡΠ±ΠΎΡΠ°-Π½Π΅Π΄ΡΠ»Ρ β Π²ΠΈΡ ΡΠ΄Π½Ρ;
- ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ ΡΠ° Π³Π°ΡΠ°Π½ΡΡΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ ΠΠΠΏΠ;
- ΡΠΎΡΡΡΠ½Ρ Π²ΡΠ΄ΠΏΡΡΡΠΊΡ β 24 ΠΊΠ°Π»Π΅Π½Π΄Π°ΡΠ½Ρ Π΄Π½Ρ, Π²ΠΈΡ ΡΠ΄Π½ΠΈΠΉ Ρ Π΄Π΅Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ;
- ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΡΠ΄Π²ΠΈΡΡΠ²Π°ΡΠΈ ΡΠ°Ρ ΠΎΠ²ΠΈΠΉ ΡΡΠ²Π΅Π½Ρ Ρ ΠΌΠ΅ΠΆΠ°Ρ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΠ³ΠΎ Π½Π°Π²ΡΠ°Π½Π½Ρ, ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ Π·Π° ΡΠ°Ρ ΡΠ½ΠΎΠΊ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ;
- ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ ΠΏΡΡΠ»Ρ Π·Π°ΠΊΡΠ½ΡΠ΅Π½Π½Ρ ΡΡΡΠΎΠΊΡ Π°Π΄Π°ΠΏΡΠ°ΡΡΡ;
- ΠΎΡΡΡ, ΠΎΠ±Π»Π°ΡΡΠΎΠ²Π°Π½ΠΈΠΉ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ, ΡΠΊΠΈΠΉ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡ Π±Π΅Π·ΠΏΠ΅ΡΠ΅ΡΠ²Π½Ρ ΡΠΎΠ±ΠΎΡΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΎΠΏΠ°Π»Π΅Π½Π½Ρ ΡΠ° Π²ΠΎΠ΄ΠΎΠΏΠΎΡΡΠ°ΡΠ°Π½Π½Ρ; Ρ ΡΠΊΡΠΈΡΡΡ ΠΉ ΡΡΠ°Π±ΡΠ»ΡΠ½ΠΈΠΉ Π·Π²βΡΠ·ΠΎΠΊ;
- ΠΏΡΠ»ΡΠ³ΠΈ ΡΠ° ΡΠ½ΡΡ Π·Π°ΠΎΡ ΠΎΡΠ΅Π½Π½Ρ β Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ;
- Π²ΡΠ΄ΠΊΡΠΈΡΡ Ρ Π΄Π΅ΠΌΠΎΠΊΡΠ°ΡΠΈΡΠ½Ρ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ ΠΊΡΠ»ΡΡΡΡΡ, ΡΠΏΡΠ»ΠΊΡΠ²Π°Π½Π½Ρ Π½Π° Β«Π’ΠΒ» ΡΠ° ΠΌΠΎΠ΄Π΅Π»Ρ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Β«Π²ΡΠ΄ΡΠΈΠ½Π΅Π½Ρ Π΄Π²Π΅ΡΡΒ»;
- ΠΎΡΡΡ Π·Π° Π°Π΄ΡΠ΅ΡΠΎΡ: Π²ΡΠ». Π‘ΡΡΠ΄Π΅Π½ΡΡΡΠΊΠ°, 3, Π² 10 Ρ Π²ΠΈΠ»ΠΈΠ½Π°Ρ ΠΏΡΡΠΊΠΈ Π²ΡΠ΄ ΠΌΠ΅ΡΡΠΎ.
ΠΠ΅ΡΠ°Π»ΡΠ½ΡΡΠ΅ ΠΏΡΠΎ Π½Π°Ρ ΠΌΠΎΠΆΠ½Π° Π΄ΡΠ·Π½Π°ΡΠΈΡΡ Π½Π° ΡΠ°ΠΉΡΡ https://it-solutions.ua/
Π§Π΅ΠΊΠ°ΡΠΌΠΎ ΠΠ°ΡΠ΅ ΡΠ΅Π·ΡΠΌΠ΅!
Π Π΅ΠΊΡΡΡΠ΅Ρ, ΠΠ°ΡΠΈΠ½Π°
Π’Π΅Π».: 063 417 23 97
More -
Β· 7 views Β· 0 applications Β· 3h
ΠΠ½ΠΆΠ΅Π½Π΅Ρ, Π½Π°ΡΠΊΠΎΠ²ΠΈΠΉ ΡΠΏΡΠ²ΡΠΎΠ±ΡΡΠ½ΠΈΠΊ, ΠΎΡΡΡΠ΅Ρ Π²ΡΠ΄Π΄ΡΠ»Ρ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Ρ (ΠΠΠ£ΠΠΠΠ ) to $700
Office Work Β· Ukraine (Dnipro) Β· 1 year of experience Β· Intermediate MilTech πͺΠ¦Π΅Π½ΡΡ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Ρ Ρ ΠΎΠΊΡΠ΅ΠΌΠΈΠΌ ΡΡΡΡΠΊΡΡΡΠ½ΠΈΠΌ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»ΠΎΠΌ ΠΠ΅ΡΠΆΠ°Π²Π½ΠΎΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΠ½ΠΎΡ ΡΠ»ΡΠΆΠ±ΠΈ ΡΡΠ°Π½ΡΠΏΠΎΡΡΡ. Π ΠΎΡΡΡΠ΅ΡΡΡΠΊΡ ΠΏΠΎΡΠ°Π΄ΠΈ ΡΠ° ΡΠΈΠ²ΡΠ»ΡΠ½Ρ. ΠΠΠΠΠΠΠΠ£ΠΠΠ Π΄ΠΎ ΡΠ΅Π±Π΅ ΠΠΠΠΠ’Π¬ ΠΠΠ‘ΠΠ― ΠΠΠΠΠ‘Π’ΠΠ ΠΠ ΠΠΠ ΠΠΈΠΌΠΎΠ³ΠΈ ΠΎΡΠ²ΡΡΠ°: ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ Π½Π°ΡΠΊ, PhD (ΡΠΎΠ·Π³Π»ΡΠ΄Π°ΡΠΌΠΎ ΡΠ°ΠΊΠΎΠΆ Π°ΡΠΏΡΡΠ°Π½ΡΡΠ²) Π²Π°ΠΊΠ°Π½ΡΡΡ Π΄Π»Ρ...Π¦Π΅Π½ΡΡ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Ρ Ρ ΠΎΠΊΡΠ΅ΠΌΠΈΠΌ ΡΡΡΡΠΊΡΡΡΠ½ΠΈΠΌ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»ΠΎΠΌ ΠΠ΅ΡΠΆΠ°Π²Π½ΠΎΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΠ½ΠΎΡ ΡΠ»ΡΠΆΠ±ΠΈ ΡΡΠ°Π½ΡΠΏΠΎΡΡΡ. Π ΠΎΡΡΡΠ΅ΡΡΡΠΊΡ ΠΏΠΎΡΠ°Π΄ΠΈ ΡΠ° ΡΠΈΠ²ΡΠ»ΡΠ½Ρ.
ΠΠΠΠΠΠΠΠ£ΠΠΠ Π΄ΠΎ ΡΠ΅Π±Π΅ ΠΠΠΠΠ’Π¬ ΠΠΠ‘ΠΠ― ΠΠΠΠΠ‘Π’ΠΠ ΠΠ ΠΠΠ
ΠΠΈΠΌΠΎΠ³ΠΈ
- ΠΎΡΠ²ΡΡΠ°: ΠΊΠ°Π½Π΄ΠΈΠ΄Π°Ρ Π½Π°ΡΠΊ, PhD (ΡΠΎΠ·Π³Π»ΡΠ΄Π°ΡΠΌΠΎ ΡΠ°ΠΊΠΎΠΆ Π°ΡΠΏΡΡΠ°Π½ΡΡΠ²)
- Π²Π°ΠΊΠ°Π½ΡΡΡ Π΄Π»Ρ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ²/Π΄ΠΎΠΊΡΠΎΡΡΠ² Π½Π°ΡΠΊ ΡΠ° Π½Π°ΡΠΊΠΎΠ²ΠΈΠΌ Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ Π² Π½Π°ΡΠΊΠΎΠ²ΠΈΡ ΡΡΡΠ°Π½ΠΎΠ²Π°Ρ
ΠΏΠΎΡΠ°Π΄Π° ΠΎΡΡΡΠ΅ΡΡΡΠΊΠΎΠ³ΠΎ ΡΠΊΠ»Π°Π΄Ρ - ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΡΡΠ°ΡΠΈ ΠΎΡΡΡΠ΅ΡΠΎΠΌ Π±Π΅Π· Π²ΡΠΉΡΡΠΊΠΎΠ²ΠΎΡ ΠΊΠ°ΡΠ΅Π΄ΡΠΈ
Π£ΠΌΠΎΠ²ΠΈ
- Π΄ΠΎΠ±ΡΠΎΠ²ΡΠ»ΡΠ½Π° ΠΌΠΎΠ±ΡΠ»ΡΠ·Π°ΡΡΡ Π°Π±ΠΎ ΡΠ»ΡΠΆΠ±Π° Π·Π° ΠΊΠΎΠ½ΡΡΠ°ΠΊΡΠΎΠΌ (Π΄ΠΎ ΠΊΡΠ½ΡΡ Π²ΠΎΡΠ½Π½ΠΎΠ³ΠΎ ΡΡΠ°Π½Ρ)
- ΡΠ»ΡΠΆΠ±Π° ΠΏΠΎΠ·Π° Π·ΠΎΠ½ΠΎΡ Π±ΠΎΠΉΠΎΠ²ΠΈΡ Π΄ΡΠΉ (ΠΏΠ΅ΡΠ΅Π²Π°ΠΆΠ½ΠΎ)
- ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΏΠ΅ΡΠ΅Π²Π΅Π΄Π΅Π½Π½Ρ ΡΠΈΠ½Π½ΠΈΡ Π²ΡΠΉΡΡΠΊΠΎΠ²ΠΎΡΠ»ΡΠΆΠ±ΠΎΠ²ΡΡΠ² Π·Π° Π·Π³ΠΎΠ΄ΠΎΡ Π±Π΅Π·ΠΏΠΎΡΠ΅ΡΠ΅Π΄Π½ΡΠΎΠ³ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈΡΠ° Π² ΡΠΈΡΡΠ΅ΠΌΡ ΠΠ‘Π‘Π’
- ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΡΠ»ΡΠΆΠ±ΠΈ Π΄Π»Ρ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ², ΡΠΊΡ Π·Π° Π²ΠΈΡΠ½ΠΎΠ²ΠΊΠΎΠΌ ΠΠΠ ΠΏΡΠΈΠ΄Π°ΡΠ½Ρ Π΄ΠΎ ΡΠ»ΡΠΆΠ±ΠΈ Ρ Π²ΡΠΉΡΡΠΊΠΎΠ²ΠΈΡ ΡΠ°ΡΡΠΈΠ½Π°Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ, Π’Π¦Π ΡΠ° Π‘Π, ΠΠΠΠ, Π½Π°Π²ΡΠ°Π»ΡΠ½ΠΈΡ ΡΠ΅Π½ΡΡΠ°Ρ ΡΠΎΡΠΎ
- Π³ΡΠΎΡΠΎΠ²Π΅ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ (ΠΌΡΠ½ΡΠΌΠ°Π»ΡΠ½ΠΈΠΉ ΠΎΠΊΠ»Π°Π΄ 20 000 Π³ΡΠΈΠ²Π΅Π½Ρ ΡΠ° ΠΎΠΊΠ»Π°Π΄ Π·Π° Π²ΡΠΉΡΡΠΊΠΎΠ²ΠΈΠΌ Π·Π²Π°Π½Π½ΡΠΌ)
-
Β· 17 views Β· 0 applications Β· 1d
Network Security Consultant
Full Remote Β· Poland Β· 4 years of experience Β· Upper-IntermediateProject Summary: We are seeking a Network Security Consultant for an insurance client in Krakow, Poland. The ideal candidate should be based in Polandβpreferably in Krakowβto facilitate effective local collaboration and oversight of security operations....Project Summary:
We are seeking a Network Security Consultant for an insurance client in Krakow, Poland. The ideal candidate should be based in Polandβpreferably in Krakowβto facilitate effective local collaboration and oversight of security operations.
Requirements:
- Proven experience in operational security management and firewall assurance.
- Strong understanding of security platforms, regulatory compliance, and best practices.
- Ability to audit, review, and implement firewall policies effectively.
- Excellent communication skills for stakeholder engagement and reporting.
Tasks:
- Operational Security Management: Monitor and manage security platforms (e.g., Proxy, IDS/IPS, Web Filtering, Firewall Assurance) and continuously optimize security protocols.
- Policy Enforcement: Review and enforce security policies to ensure compliance with company standards and regulatory requirements. - Firewall Assurance & Process Management: Audit security processes, validate global process flows, conduct approval reviews, and implement policy updates for optimal firewall security.
- Cross-Functional Collaboration: Work closely with the Network Security team and other departments to ensure a cohesive security infrastructure, and communicate security incidents with strategic recommendations for improvement.
- Reporting & Documentation: Generate detailed security reports, including performance metrics and compliance status, and provide actionable insights to enhance security processes
We offer:
β’ Attractive financial package
β’ Challenging projects
β’ Professional & career growth
β’ Great atmosphere in a friendly small team
More
-
Β· 12 views Β· 0 applications Β· 1d
Mobile Assessment Engineer
Full Remote Β· Ukraine Β· Product Β· 2 years of experienceBig product software company is looking for a Mobile Assessment Engineer. Remote work, high salary + financial bonuses (up to 100% of the salary), regular salary review, interesting projects, good working conditions. REQUIREMENTS: - 2+ years of relevant...Big product software company is looking for a Mobile Assessment Engineer. Remote work, high salary + financial bonuses (up to 100% of the salary), regular salary review, interesting projects, good working conditions.
REQUIREMENTS:
- 2+ years of relevant professional experience;
- Deep understanding of Android security architecture;
- Practical experience in reverse engineering;
- Knowledge of C/C++, Java;
- Higher education;
- Technical English (higher level is advantage).
COMPANY OFFERS:
- Employment under gig-contract, all taxes are paid;
- Flexible working hours;
- 28 days of paid vacation + 15 days at your own expense;
- Paid sick leave;
- Medical insurance (with dentistry and optics), including the children;
- Opportunity to become an inventor of international patents with paid bonuses;
- Career and professional growth;
- Own base of courses and trainings;
- Office in the Kyiv city centre / remotely;
- Provision of necessary up-to-date equipment;
- Regular salary review and financial bonuses (up to 100% of the salary);
- Bonuses for wedding, birth of children and other significant events;
- Paid maternity leave;
- Paid lunches, tea, coffee, water, snacks;
- Discounts to company's products, services.
More -
Β· 14 views Β· 0 applications Β· 2d
Application Security Engineer (DAST, SAST, SCA)
Ukraine Β· Product Β· 4 years of experience Β· IntermediateApplication Security Engineer ΠΠΈΡΠ² | ΠΡΠ±ΡΠΈΠ΄ | Full-time Π₯ΠΎΡΠ΅Ρ Π±ΡΠ΄ΡΠ²Π°ΡΠΈ ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ, ΡΠΊΡ ΡΠΊΠ»Π°Π΄Π½ΠΎ Π·Π»Π°ΠΌΠ°ΡΠΈ? Π£ Π½Π°Ρ Ρ Π΄Π»Ρ ΡΠ΅Π±Π΅ Π²ΠΈΠΊΠ»ΠΈΠΊ. ΠΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ Application Security Engineer, ΡΠΊΠΈΠΉ Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ ΠΏΡΠ΄Π²ΠΈΡΠΈΡΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΡ Π½Π°ΡΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ² Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ β Π²ΡΠ΄ Π΄ΠΈΠ·Π°ΠΉΠ½Ρ Π΄ΠΎ...π Application Security Engineer
ΠΠΈΡΠ² | ΠΡΠ±ΡΠΈΠ΄ | Full-time
Π₯ΠΎΡΠ΅Ρ Π±ΡΠ΄ΡΠ²Π°ΡΠΈ ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ, ΡΠΊΡ ΡΠΊΠ»Π°Π΄Π½ΠΎ Π·Π»Π°ΠΌΠ°ΡΠΈ? Π£ Π½Π°Ρ Ρ Π΄Π»Ρ ΡΠ΅Π±Π΅ Π²ΠΈΠΊΠ»ΠΈΠΊ.
ΠΠΈ ΡΡΠΊΠ°ΡΠΌΠΎ Application Security Engineer, ΡΠΊΠΈΠΉ Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ ΠΏΡΠ΄Π²ΠΈΡΠΈΡΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΡ Π½Π°ΡΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ² Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ β Π²ΡΠ΄ Π΄ΠΈΠ·Π°ΠΉΠ½Ρ Π΄ΠΎ Π΄Π΅ΠΏΠ»ΠΎΡ.
Π©ΠΎ ΡΠΈ Π±ΡΠ΄Π΅Ρ ΡΠΎΠ±ΠΈΡΠΈ:
- ΠΡΠΎΠ²ΠΎΠ΄ΠΈΡΠΈ SAST, DAST, SCA ΠΏΠ΅ΡΠ΅Π²ΡΡΠΊΠΈ Π΄Π»Ρ Π²Π½ΡΡΡΡΡΠ½ΡΡ Π²Π΅Π± ΡΠ° Π΄Π΅ΡΠΊΡΠΎΠΏ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ²
- ΠΠ½Π°Π»ΡΠ·ΡΠ²Π°ΡΠΈ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠΈ ΡΠΊΠ°Π½ΡΠ²Π°Π½Ρ, Π·Π½Π°Ρ ΠΎΠ΄ΠΈΡΠΈ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΡ ΡΠ° Π΄ΠΎΠΏΠΎΠΌΠ°Π³Π°ΡΠΈ ΡΡ Π·Π°ΠΊΡΠΈΠ²Π°ΡΠΈ
- ΠΠ°Π»Π°ΡΡΠΎΠ²ΡΠ²Π°ΡΠΈ ΡΠ° Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΡΠ²Π°ΡΠΈ DAST/SAST/SCA ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΈ
- ΠΠΈΡΠ°ΡΠΈ ΡΠΊΡΠΈΠΏΡΠΈ (Python, Perl, Ruby) Π΄Π»Ρ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·Π°ΡΡΡ
- Π ΠΎΠ±ΠΈΡΠΈ ΡΠ΅Π²βΡ Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ, ΠΊΠΎΠ΄Ρ, ΠΏΡΠΎΠ²ΠΎΠ΄ΠΈΡΠΈ threat modeling
- ΠΠ΅ΡΡΠΈ Π΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ°ΡΡΡ, ΡΠΎΡΠΌΡΠ²Π°ΡΠΈ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ, roadmap'ΠΈ, Π·Π²ΡΡΠΈ
- ΠΠ°Π²ΡΠ°ΡΠΈ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ Π±Π΅Π·ΠΏΠ΅ΡΠ½ΠΎΠΌΡ ΠΊΠΎΠ΄ΡΠ²Π°Π½Π½Ρ, Π΄ΡΠ»ΠΈΡΠΈΡΡ best practices
- ΠΠ½ΡΠ΅Π³ΡΡΠ²Π°ΡΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΡ Π² CI/CD ΡΠ°Π·ΠΎΠΌ Π· DevOps
- Π‘ΠΏΡΠ²ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈ Π· Π°Π½Π°Π»ΡΡΠΈΠΊΠ°ΠΌΠΈ, ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ°ΠΌΠΈ, Π΄Π°ΡΠ°-ΡΠ°ΠΉΠ΅Π½ΡΠΈΡΡΠ°ΠΌΠΈ
Π©ΠΎ ΠΎΡΡΠΊΡΡΠΌΠΎ:
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ, ΡΠΊ Π±ΡΠ΄ΡΡΡΡΡΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΠΈ ΡΠ° ΡΠΊ ΡΡ Π»Π°ΠΌΠ°ΡΡΡ
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· ΠΎΠ΄Π½ΡΡΡ ΡΠΈ ΠΊΡΠ»ΡΠΊΠΎΠΌΠ° ΠΌΠΎΠ²Π°ΠΌΠΈ: Java, Scala, C#, Ruby, Perl, Python, PowerShell
- ΠΠ½Π°Π½Π½Ρ OWASP, Π΄ΠΎΡΠ²ΡΠ΄ Π· ΡΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ: Fortify, Checkmarx, Burp Suite, ΡΠΎΡΠΎ
- ΠΠΏΠ΅Π²Π½Π΅Π½Π° ΡΠΎΠ±ΠΎΡΠ° Π· Windows, Linux, Mac, Ρ ΠΌΠ°ΡΠ°ΠΌΠΈ: AWS, Azure, GCP
- ΠΠΌΡΠ½Π½Ρ ΠΌΠΈΡΠ»ΠΈΡΠΈ ΠΊΡΠΈΡΠΈΡΠ½ΠΎ, ΡΡΡΡΠΊΡΡΡΠ½ΠΎ, Π±ΡΠ°ΡΠΈ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ
- ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Jira, Confluence, VMware, Miro β ΠΏΠ»ΡΡ
ΠΡΠ΄Π΅ ΠΏΠ΅ΡΠ΅Π²Π°Π³ΠΎΡ:
- Π‘Π΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ (OSCP, CEH, ΡΠ½ΡΡ)
- Π£ΡΠ°ΡΡΡ Ρ Bug Bounty
- ΠΠΎΡΠ²ΡΠ΄ Π· Kali Linux, Metasploit, Nmap
- Π ΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ²: OWASP, NIST, ISO 27001, PCI DSS
- ΠΠΎΡΠ²ΡΠ΄ Π· ΠΏΠΎΠ»ΡΡΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡΡ, ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΡ
Π©ΠΎ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
β¨ ΠΠΏΠ»ΠΈΠ² Π½Π° ΠΏΡΠΎΠ΄ΡΠΊΡ Ρ ΡΠ΅Π°Π»ΡΠ½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠΈ
πΈ ΠΠΎΠ½ΠΊΡΡΠ΅Π½ΡΠ½Π° ΠΠ Π· ΠΏΠ΅ΡΠ΅Π³Π»ΡΠ΄Π°ΠΌΠΈ
π 17 Π΄Π½ΡΠ² Π²ΡΠ΄ΠΏΡΡΡΠΊΠΈ + 14 Π»ΡΠΊΠ°ΡΠ½ΡΠ½ΠΈΡ
π©Ί ΠΠ΅Π΄ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ
π ΠΡΠ΄ΠΆΠ΅Ρ Π½Π° Π½Π°Π²ΡΠ°Π½Π½Ρ, ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΡΡ, ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ
π¬π§ ΠΠ΅Π·ΠΊΠΎΡΡΠΎΠ²Π½Π° Π°Π½Π³Π»ΡΠΉΡΡΠΊΠ°
β° ΠΠ½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ
π’ ΠΠ°ΡΠΈΡΠ½ΠΈΠΉ ΠΎΡΡΡ Ρ ΡΠ΅Π½ΡΡΡ ΠΠΈΡΠ²Π° Π· ΠΏΠ°ΡΠΊΡΠ²Π°Π½Π½ΡΠΌ
ΠΠΎΡΠΎΠ²ΠΈΠΉ/Π° Π·ΡΠΎΠ±ΠΈΡΠΈ ΠΏΡΠΎΠ΄ΡΠΊΡΠΈ ΡΠΈΠ»ΡΠ½ΡΡΠΈΠΌΠΈ?
More
π© ΠΠ°Π΄ΡΠΈΠ»Π°ΠΉ ΡΠ΅Π·ΡΠΌΠ΅ β Ρ letβs secure it! -
Β· 14 views Β· 1 application Β· 2d
Corporate Security Lead
Hybrid Remote Β· Ukraine Β· Product Β· 5 years of experience Β· Intermediate Ukrainian Product πΊπ¦Uklon β ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Π° IT-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠ°ΠΉΠ΄-Ρ Π΅ΠΉΠ»ΡΠ½Π³ ΡΠ΅ΡΠ²ΡΡ. Π©ΠΎΠ΄Π½Ρ ΠΏΠΎΡΡΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡΠΎΠΊΠ°ΡΡΡ ΠΎΠ΄Π½Ρ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡ Π½Π° ΡΠΈΠ½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π·Π° ΡΡ ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΠΈ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΄ΡΠ°ΠΉΠ²Π΅ΡΡΠ² ΡΠ° ΡΠ°ΠΉΠ΄Π΅ΡΡΠ². ΠΠΈ ΡΡΠ²ΠΎΡΡΡΠΌΠΎ highload...MoreUklon β ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Π° IT-ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΡΠΎ ΡΠΎΠ·ΡΠΎΠ±Π»ΡΡ ΠΏΡΠΎΠ²ΡΠ΄Π½ΠΈΠΉ ΡΠ°ΠΉΠ΄-Ρ Π΅ΠΉΠ»ΡΠ½Π³ ΡΠ΅ΡΠ²ΡΡ. Π©ΠΎΠ΄Π½Ρ ΠΏΠΎΡΡΠΆΠ½Π° ΠΊΠΎΠΌΠ°Π½Π΄Π° Uklon ΠΏΡΠΎΠΊΠ°ΡΡΡ ΠΎΠ΄Π½Ρ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡ Π½Π° ΡΠΈΠ½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° Π·Π° ΡΡ ΠΌΠ΅ΠΆΠ°ΠΌΠΈ, Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΠΈ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π΄ΡΠ°ΠΉΠ²Π΅ΡΡΠ² ΡΠ° ΡΠ°ΠΉΠ΄Π΅ΡΡΠ².
ΠΠΈ ΡΡΠ²ΠΎΡΡΡΠΌΠΎ highload ΠΏΡΠΎΠ΄ΡΠΊΡ, Π·Π° ΡΠΊΠΈΠΌ Ρ ΠΎΠ²Π°ΡΡΡΡΡ Π°ΠΌΠ±ΡΡΠ½Ρ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Ρ ΡΠ΅Π»Π΅Π½Π΄ΠΆΡ, Π±Π΅Π·ΠΏΠ΅ΡΠ΅ΡΠ²Π½Ρ ΡΠ½Π½ΠΎΠ²Π°ΡΡΡ ΡΠ° Π½Π΅ΠΎΡΠ΅Π²ΠΈΠ΄Π½Ρ Ρ ΠΎΠ΄ΠΈ. ΠΠ°Ρ ΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊ ΡΠΎΠ±ΠΎΡΠΈ β ΡΠ΅ΡΡΡΠ²Π°ΡΠΈ Π½ΠΎΠ²Ρ Π³ΡΠΏΠΎΡΠ΅Π·ΠΈ, ΠΏΡΡΠΈΡΠΈ ΡΠ²ΠΎΡ ΡΠ΄Π΅Ρ ΡΠ° Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΠ²Π°ΡΠΈ ΠΎΡΡΠ°Π½Π½ΡΠΉ ΡΡΠ΅ΠΊ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ.
ΠΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ Π½Π°Ρ Ρ ΡΠΎΠ»Ρ Corporate Security Lead Π² ΠΠΈΡΠ²ΡΠ©ΠΎ ΠΌΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ ΡΠ°ΠΌΠ΅ Π΄Π»Ρ ΡΡΡΡ ΡΠΎΠ»Ρ:
β’ ΠΏΠΎΠ²Π½Ρ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π°Π»ΡΠ½ΡΡΡΡ Π·Π° ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΡ β ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΡΠ°ΠΌΠΎΡΡΡΠΉΠ½ΠΎ ΠΊΠ΅ΡΡΠ²Π°ΡΠΈ ΠΏΡΠΎΡΠ΅ΡΠ°ΠΌΠΈ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡ Π·Π°Ρ ΠΈΡΡΡ
β’ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· ΡΠΎΠΏΠΎΠ²ΠΈΠΌΠΈ Π΅ΠΊΡΠΏΠ΅ΡΡΠ°ΠΌΠΈ β ΠΎΠ±ΠΌΡΠ½ Π·Π½Π°Π½Π½ΡΠΌΠΈ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ΠΎΠΌ Π· ΡΠ°Ρ ΡΠ²ΡΡΠΌΠΈ Ρ ΡΡΠ΅ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π΄ΠΎΡΡΡΠΏ Π΄ΠΎ Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ ΡΠ΅ΡΡΡΡΡΠ² β ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ Π·Π°Π»ΡΡΠ°ΡΠΈ ΠΊΠΎΠ½ΡΠ°Π»ΡΠΈΠ½Π³ΠΎΠ²Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π΄Π»Ρ ΠΏΡΠ΄ΡΠΈΠ»Π΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²ΠΈΡ ΡΠ½ΡΡΡΠ°ΡΠΈΠ²
β’ ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡΠ²Π°ΡΠΈ ΡΠΈΡΡΠ΅ΠΌΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π΄ΠΎΠ΄Π°ΡΡΠΈ ΡΠ° Π½Π°Π»Π°ΡΡΠΎΠ²ΡΡΡΠΈ ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ½Ρ ΡΠΎΡΠΊΠΈ Π΄Π»Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ
β’ ΡΡΡΠ°ΡΠ½Ρ ΠΏΡΠ΄Ρ ΠΎΠ΄ΠΈ Π΄ΠΎ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠ²
β’ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΈΠΉ performance & salary review
β’ ΠΊΡΠ»ΡΡΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π² ΡΠΊΡΠΉ ΠΊΠΎΠΆΠ΅Π½ Ρ Π·Π½Π°ΡΡΡΠΈΠΌ Ρ ΡΡΠ½Π½ΠΈΠΌ ΡΠ° ΠΌΠ°Ρ Π²ΠΏΠ»ΠΈΠ² Π½Π° ΠΏΡΠΎΡΠ΅ΡΠΈΠ―ΠΊ ΡΠ°ΠΌΠ΅ ΡΠΈ ΠΌΠΎΠΆΠ΅Ρ Π²ΠΏΠ»ΠΈΠ²Π°ΡΠΈ Π½Π° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ:
β’ ΡΠΎΡΠΌΡΠ²Π°Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΡ ΡΡΡΠ°ΡΠ΅Π³ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ ΠΏΡΠΈΠ½ΡΠΈΠΏΡΠ² ESRM
β’ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π°ΠΊΡΡΠ°Π»ΡΠ·Π°ΡΡΡ ΠΊΠ°ΡΡΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠΏΡΠ»ΡΠ½ΠΎ Π· ΠΊΠ΅ΡΡΠ²Π½ΠΈΠΊΠ°ΠΌΠΈ ΠΏΡΠ΄ΡΠΎΠ·Π΄ΡΠ»ΡΠ²
β’ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π· ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΡΠ·ΠΈΡΠ½ΠΎΡ, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ ΡΠ° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΡ
β’ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΌΠ΅Ρ Π°Π½ΡΠ·ΠΌΡΠ² Π²Π½ΡΡΡΡΡΠ½ΡΠΎΠ³ΠΎ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ
β’ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ, ΠΏΠΎΠΏΠ΅ΡΠ΅Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° Π·Π°Π³ΡΠΎΠ·ΠΈ Π΄Π»Ρ Π°ΠΊΡΠΈΠ²ΡΠ² ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ° ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ
β’ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠ»Π°Π½ΡΠ² ΠΊΡΠΈΠ·ΠΎΠ²ΠΎΠ³ΠΎ ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ Π°Π½ΡΠΈΠΊΡΠΈΠ·ΠΎΠ²ΠΎΡ Π³ΡΡΠΏΠΈ
β’ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΡΡΠ΅ΠΌΠΎΡ ΡΡΠ·ΠΈΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ (ΠΎΡ ΠΎΡΠΎΠ½Π°, ΡΠ½ΠΆΠ΅Π½Π΅ΡΠ½ΠΎ-ΡΠ΅Ρ Π½ΡΡΠ½Ρ Π·Π°ΡΠΎΠ±ΠΈ, Π²Π½ΡΡΡΡΡΠ½Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡΠΈ, Π±Π΅Π·ΠΏΠ΅ΠΊΠ° ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ ΡΠΎΡΠΎ)
β’ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ΠΏΡΠΎΡΠΈΠ΄ΡΡ ΡΠ°Ρ ΡΠ°ΠΉΡΡΠ²Ρ, ΠΊΡΠ°Π΄ΡΠΆΠΊΠ°ΠΌ, ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΈΠΌ Π·Π»ΠΎΡΠΈΠ½Π°ΠΌ ΡΠΎΡΠΎ)
β’ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·Π°Ρ ΠΈΡΡ ΠΊΠΎΠ½ΡΡΠ΄Π΅Π½ΡΡΠΉΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ
β’ ΠΎΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ° ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²ΡΠ°Π½Ρ, ΡΠ½ΡΡΡΡΠΊΡΠ°ΠΆΡΠ² ΡΠ° ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΡΡΠ²Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ Π· ΠΏΠΈΡΠ°Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· ΠΏΡΠ°Π²ΠΎΠΎΡ ΠΎΡΠΎΠ½Π½ΠΈΠΌΠΈ ΠΎΡΠ³Π°Π½Π°ΠΌΠΈ, ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΡΡΠΈΠΌΠΈ ΡΡΡΡΠΊΡΡΡΠ°ΠΌΠΈ ΡΠ° ΠΏΠ°ΡΡΠ½Π΅ΡΠ°ΠΌΠΈ Ρ ΡΡΠ΅ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎ-Π°Π½Π°Π»ΡΡΠΈΡΠ½Π΅ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π·Π° Π½Π°ΠΏΡΡΠΌΠΊΠΎΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π±Π΅Π·ΠΏΠΎΡΠ΅ΡΠ΅Π΄Π½Ρ ΡΡΠ°ΡΡΡ Ρ ΡΠΎΠ·Π±ΡΠ΄ΠΎΠ²Ρ ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π±ΡΠ·Π½Π΅ΡΡ
Π§Π΅Π»Π΅Π½Π΄ΠΆΡ Π½Π° 6 ΠΌΡΡΡΡΡΠ²:
β’ ΠΎΠ·Π½Π°ΠΉΠΎΠΌΠ»Π΅Π½Π½Ρ ΡΠ° Π²ΠΈΠ²ΡΠ΅Π½Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΡ Π±ΡΠ·Π½Π΅Ρ-ΠΏΡΠΎΡΠ΅ΡΡΠ²
β’ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ ΡΠ° ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π·Π° Π½Π°ΠΏΡΡΠΌΠΊΠ°ΠΌΠΈ: ΡΡΠ·ΠΈΡΠ½Π°, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Π° ΡΠ° ΠΊΠ°Π΄ΡΠΎΠ²Π° Π±Π΅Π·ΠΏΠ΅ΠΊΠ°)
β’ Π·Π°ΡΠ²Π΅ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊΠΈ ΡΠ° ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π· ΠΊΠ΅ΡΡΠ²Π½ΠΈΠΊΠΎΠΌΠΠ»Ρ Π΄ΠΎΡΡΠ³Π½Π΅Π½Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡΠ², ΡΠΎΠ±Ρ Π·Π½Π°Π΄ΠΎΠ±Π»ΡΡΡΡΡ:
β’ Π²ΠΈΡΠ° ΠΎΡΠ²ΡΡΠ° (ΡΡΠΈΠ΄ΠΈΡΠ½Π°, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Π°, Π°Π±ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½Π°)
β’ Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π²ΡΠ΄ 5 ΡΠΎΠΊΡΠ² Π½Π° ΠΊΠ΅ΡΡΠ²Π½ΠΈΡ ΠΏΠΎΡΠ°Π΄Π°Ρ Π² ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π³Π»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ° ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΠΉ ASIS International ΡΠ° ΡΡ Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ Ρ ΡΡΠ΅ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ ΠΏΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Enterprise Security Risk Management (ESRM)
β’ Π·Π½Π°Π½Π½Ρ Π·Π°ΠΊΠΎΠ½ΠΎΠ΄Π°Π²ΡΡΠ²Π° Π£ΠΊΡΠ°ΡΠ½ΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° Π² Π³Π°Π»ΡΠ·Ρ, Π΄ΠΎΡΠΈΡΠ½ΡΠΉ Π΄ΠΎ ΡΡΠ½ΠΊΡΡΠΉ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π·Π΄Π°ΡΠ½ΡΡΡΡ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ΡΡΠ·ΠΈΡΠ½ΠΎΡ, Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ, ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ)
β’ Π½Π°Π²ΠΈΡΠΊΠΈ ΡΠΎΠ·ΡΠΎΠ±ΠΊΠΈ ΡΠ° ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ ΡΡΡΠ°ΡΠ΅Π³ΡΠΉ Π·Π°Ρ ΠΈΡΡΡ Π°ΠΊΡΠΈΠ²ΡΠ², ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ° ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π΄ΠΎΡΠ²ΡΠ΄ Π½Π°ΠΏΠΈΡΠ°Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ, ΡΡΡΠ°ΡΠ΅Π³ΡΠΉ Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ
β’ Π΄ΠΎΡΠ²ΡΠ΄ Π²Π·Π°ΡΠΌΠΎΠ΄ΡΡ Π· Π΄Π΅ΡΠΆΠ°Π²Π½ΠΈΠΌΠΈ ΡΡΡΡΠΊΡΡΡΠ°ΠΌΠΈ, ΠΏΡΠ°Π²ΠΎΠΎΡ ΠΎΡΠΎΠ½Π½ΠΈΠΌΠΈ ΠΎΡΠ³Π°Π½Π°ΠΌΠΈ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»ΡΡΡΠΈΠΌΠΈ ΡΠ½ΡΡΠΈΡΡΡΡΡΠΌΠΈ
β’ Π·Π½Π°Π½Π½Ρ ΡΡΡΠ°ΡΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (Π²ΡΠ΄Π΅ΠΎΡΠΏΠΎΡΡΠ΅ΡΠ΅ΠΆΠ΅Π½Π½Ρ, ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ, ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠ° ΡΠΎΡΠΎ)
β’ Π½Π°ΡΠ²Π½ΡΡΡΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠ² ASIS International (Ρ ΡΡΠ΅ΡΡ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ), ΠΠΠΠ Π£ΠΊΡΠ°ΡΠ½ΠΈ
β’ Π΄ΠΎΡΠ²ΡΠ΄ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΠΎΡΡΠ½ΠΊΠΈ ΡΠΈΠ·ΠΈΠΊΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΠΏΡΠ΄ΠΏΡΠΈΡΠΌΡΡΠ²Π°
β’ Π·Π½Π°Π½Π½Ρ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ ΠΌΠΎΠ²ΠΈ Π½Π° ΡΡΠ²Π½Ρ Π²ΡΠ΄ Intermediate
Π―ΠΊ ΡΠΈ ΡΠ΅Π³ΡΠ»ΡΡΡ ΡΠ²ΡΠΉ ΡΠΎΠ±ΠΎΡΠΈΠΉ ΡΠ°Ρ?
β’ Π³Π½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ Π· ΠΎΠ±ΠΎΠ²βΡΠ·ΠΊΠΎΠ²ΠΈΠΌΠΈ ΡΠΏΡΠ»ΡΠ½ΠΈΠΌΠΈ Π³ΠΎΠ΄ΠΈΠ½Π°ΠΌΠΈ ΡΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· 11:00 Π΄ΠΎ 16:00
β’ days off Π·Ρ Π·Π±Π΅ΡΠ΅ΠΆΠ΅Π½Π½ΡΠΌ Π²ΠΈΠ½Π°Π³ΠΎΡΠΎΠ΄ΠΈ: 20 Π½Π° ΠΎΡΠΎΠ±ΠΈΡΡΡ ΠΏΠΎΡΡΠ΅Π±ΠΈ, ΡΠ΅ 1 Π· Π½Π°Π³ΠΎΠ΄ΠΈ Π΄Π½Ρ Π½Π°ΡΠΎΠ΄ΠΆΠ΅Π½Π½Ρ, 10 ΡΠ΅ΡΠ΅Π· Ρ Π²ΠΎΡΠΎΠ±Ρ, Π΄ΠΎ 8-ΠΌΠΈ Π·Π° Π΄ΠΎΠ½Π°ΡΡΡ ΠΊΡΠΎΠ²Ρ
Π―ΠΊ ΡΠΈ Π±ΡΠ΄Π΅Ρ ΠΏΡΠΎΠΊΠ°ΡΡΠ²Π°ΡΠΈ ΡΠ²ΠΎΡ ΡΠΊΡΠ»ΠΈ Π² Uklon?
β’ Π²Π½ΡΡΡΡΡΠ½ΡΠΉ ΠΎΠ±ΠΌΡΠ½ Π·Π½Π°Π½Π½ΡΠΌΠΈ, ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΈ ΠΌΠ΅Π½ΡΠΎΡΡΡΠ²Π° ΡΠ° ΡΡΠ΅Π½ΡΠ½Π³ΠΈ Π· ΡΠΎΠ·Π²ΠΈΡΠΊΡ soft ΡΠ° hard skills
β’ ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ ΠΏΡΠΎΡΡΠ»ΡΠ½ΠΈΡ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ Π΄Π»Ρ Π΅ΠΊΡΠΏΠ΅ΡΡΡΠ²
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Π° Π±ΡΠ±Π»ΡΠΎΡΠ΅ΠΊΠ° ΡΠ° ΠΏΡΠ΄ΠΏΠΈΡΠΊΠΈ Π½Π° ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Ρ ΡΠ΅ΡΡΡΡΠΈ
β’ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΠΉ/ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΈΠΉ Π±ΡΠ΄ΠΆΠ΅Ρ Π½Π° Π½Π°Π²ΡΠ°Π½Π½Ρ
β’ ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ English lessons Π· Π²ΡΠ΄ΠΎΠΌΠΈΠΌΠΈ ΠΏΡΠΎΠ²Π°ΠΉΠ΄Π΅ΡΠ°ΠΌΠΈ
Care and support:
β’ ΠΌΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ Π² Π£ΠΊΡΠ°ΡΠ½Ρ
β’ ΡΠ΅ΡΡΡ Π· ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΠΎΠΌ
β’ Π·Π±Π΅ΡΠ΅ΠΆΠ΅Π½Π½Ρ 100% ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π½Π°ΡΠΈΡ Π·Π°Ρ ΠΈΡΠ½ΠΈΠΊΡΠ²
β’ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ ΡΠ²ΠΎΡΡ Π±ΡΠΉΡΡΠ² Π² ΠΠ‘Π£ Π°ΠΌΡΠ½ΡΡΡΡΡ ΡΠ° ΠΌΠ΅Π΄ΠΈΠΊΠ°ΠΌΠ΅Π½ΡΠ°ΠΌΠΈ
β’ Π³Π΅ΠΉΠΌΡΡΡΠΊΠ°ΡΡΡ, ΠΏΠΎΠ΄Π°ΡΡΠ½ΠΊΠΈ ΡΠ° ΡΠΎΠ·ΡΠ³ΡΠ°ΡΡ
β’ ΡΠΏΠΎΡΡΠΈΠ²Π½Ρ Π·Π°Ρ ΠΎΠ΄ΠΈ ΡΠ° ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ ΡΡΠΌΠ±ΡΠ»Π΄ΡΠ½Π³ΠΈ
β’ ΠΏΡΠΎΠΌΠΎΠΊΠΎΠ΄ΠΈ Π½Π° ΠΏΠΎΡΠ·Π΄ΠΊΠΈ Π· Uklon
Regular Sport Activities:
β’ Uklon Football ΡΠΎΡΠΈΠΆΠ½Ρ
β’ Uklon Online Yoga ΡΠΎΡΠΈΠΆΠ½Ρ
β’ ΠΊΠΎΡΠΏΠΎΡΠ°ΡΠΈΠ²Π½Ρ Π·Π½ΠΈΠΆΠΊΠΈ, ΡΠ°ΡΡΠΊΠΎΠ²Π° ΠΊΠΎΠΌΠΏΠ΅Π½ΡΠ°ΡΡΡ Π·Π°Π½ΡΡΡ ΡΠΏΠΎΡΡΠΎΠΌ
Corporate social responsibility
Π©Π΅ Π· 2014 ΡΠΎΠΊΡ Uklon Π°ΠΊΡΠΈΠ²Π½ΠΎ ΠΏΡΠ΄ΡΡΠΈΠΌΡΡ ΡΠΊΡΠ°ΡΠ½ΡΡΠΊΡ Π°ΡΠΌΡΡ ΡΠ° Π²ΠΎΠ»ΠΎΠ½ΡΠ΅ΡΡΡΠΊΡ ΡΠΏΡΠ»ΡΠ½ΠΎΡΡ, Ρ ΠΏΠΎΡΡΡΠΉΠ½ΠΈΠΌ ΠΏΠ°ΡΡΠ½Π΅ΡΠΎΠΌ ΠΠ€ <ΠΠΎΠ²Π΅ΡΠ½ΠΈΡΡ ΠΆΠΈΠ²ΠΈΠΌ>, Π° Π· 2022 ΡΠΎΠΊΡ Π½Π°Π΄Π°Ρ ΡΠΎΠΌΡΡΡΡΠ½Ρ ΡΡΠ½Π°Π½ΡΠΎΠ²Ρ ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ <Π€ΠΎΠ½Π΄Ρ Π‘Π΅ΡΠ³ΡΡ ΠΡΠΈΡΡΠ»ΠΈ>. Π’Π°ΠΊΠΎΠΆ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΎ ΠΏΡΠ΄ΡΡΠΈΠΌΡΡ ΡΠ° ΠΎΡΠ³Π°Π½ΡΠ·ΠΎΠ²ΡΡ Π·Π±ΠΎΡΠΈ, Π½Π°Ρ ΡΠΎΠΊΡΡ β Π΄ΡΠΎΠ½ΠΈ, Π°Π±ΠΈ Π²ΠΎΡΠ²Π°Π»ΠΈ Π²ΠΎΠ½ΠΈ, Π° Π½Π΅ Π»ΡΠ΄ΠΈ.
Π ΡΠΎΠ± Π·Π°Π»ΡΡΠΈΡΠΈ Π΄ΠΎ Π±Π»Π°Π³ΠΎΠ΄ΡΠΉΠ½ΠΎΡΡΡ ΡΠΏΡΠ»ΡΠ½ΠΎΡΡ ΡΠ°ΠΉΠ΄Π΅ΡΡΠ² Uklon, Ρ Π·Π°ΡΡΠΎΡΡΠ½ΠΎΠΊ Π΄ΠΎΠ΄Π°Π»ΠΈ ΡΡΠ½ΠΊΡΡΡ ΡΠ°Π·ΠΎΠ²ΠΎΠ³ΠΎ ΡΠ° ΡΠ΅Π³ΡΠ»ΡΡΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠ½Π°ΡΡ.
Π―ΠΊΡΠΎ ΡΠΈ ΡΡΠΊΠ°ΡΡ Π΄ΡΠ°ΠΉΠ²ΠΎΠ²Ρ ΡΠ° Π°ΠΌΠ±ΡΡΡΠΉΠ½Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ²Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΎΡΡΡΠ½ΡΠΎΠ²Π°Π½Ρ Π½Π° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ ΡΠ° ΡΠ²ΡΡΠΎΠ²Ρ Π΅ΠΊΡΠΏΠ°Π½ΡΡΡ, Π·Π°ΡΡΠΊΠ°Π²Π»Π΅Π½ΠΈΠΉ Ρ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ Π½ΠΎΠ²ΡΡΠ½ΡΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ ΡΠ° Π³ΠΎΡΠΎΠ²ΠΈΠΉ Π΄Π°Π»Ρ ΠΏΡΠ΄Π²ΠΈΡΡΠ²Π°ΡΠΈ ΡΠ²ΠΎΡ Π΅ΠΊΡΠΏΠ΅ΡΡΠΈΠ·Ρ, ΠΏΡΠΈΡΠ΄Π½ΡΠΉΡΡ Π΄ΠΎ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ Uklon.
ΠΠ΅ΡΠ΅Π΄ ΠΏΠΎΠ΄Π°Π½Π½ΡΠΌ Π·Π°ΡΠ²ΠΊΠΈ Π½Π° Π²ΡΠ΄ΠΊΡΠΈΡΡ ΠΏΠΎΠ·ΠΈΡΡΡ Π² Uklon, Π±ΡΠ΄Ρ Π»Π°ΡΠΊΠ°, ΠΎΠ·Π½Π°ΠΉΠΎΠΌΡΠ΅ΡΡ Π· Π£ΠΌΠΎΠ²Π°ΠΌΠΈ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ ΡΠ° Π·Π°Ρ ΠΈΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ ΠΊΠ°Π½Π΄ΠΈΠ΄Π°ΡΡΠ². ΠΠ°Π΄ΡΠΈΠ»Π°ΡΡΠΈ Π½Π°ΠΌ ΡΠ²ΠΎΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½Ρ Π΄Π°Π½Ρ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° ΡΡ, ΡΠΎ ΠΌΡΡΡΡΡΡΡΡ Ρ Π²Π°ΡΠΎΠΌΡ ΡΠ΅Π·ΡΠΌΠ΅, Π²ΠΈ Π΄Π°ΡΡΠ΅ Π·Π³ΠΎΠ΄Ρ Π½Π° ΠΎΠ±ΡΠΎΠ±ΠΊΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΈΡ Π΄Π°Π½ΠΈΡ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ ΡΠΈΡ Π£ΠΌΠΎΠ². -
Β· 52 views Β· 10 applications Β· 3d
Head of IT Operations and Security
Full Remote Β· Countries of Europe or Ukraine Β· Product Β· 5 years of experience Β· Upper-Intermediate Ukrainian Product πΊπ¦Weβre looking for a sharp, business-oriented expert to lead Information Security, IT Systems, and Automation initiatives across the company β someone who balances strategic thinking with hands-on execution and turns complexity into secure, scalable, and...Weβre looking for a sharp, business-oriented expert to lead Information Security, IT Systems, and Automation initiatives across the company β someone who balances strategic thinking with hands-on execution and turns complexity into secure, scalable, and streamlined solutions that truly serve business goals.
You donβt just manage systems β you align systems with business needs.
You donβt just run security β you see and mitigate risks before they become problems..
You donβt just automate β you transform.
If you thrive in complexity, love solving meaningful problems, and think like an expert partner (not just a task executor) β this role is for you.
Requirements:
- Ability to analyze complex security issues and deliver effective, practical solutions.
- Deep knowledge of information security principles, standards, network protection, encryption, and secure coding practices.
- Proficiency in conducting risk assessments, vulnerability assessments, and penetration testing.
- Experience managing or working with Ops, DevOps, Jira, Helpdesk, and Development teams.
- Competence in managing IT audits, performance evaluations, and cost-efficient planning.
- Solid background in IT architecture design, systems integration (ERP, CRM, HRM, project management tools), and optimization.
- Ability to lead complex IT projects and large-scale system migrations.
- Track record of engaging external experts to enhance delivery where required.
- English - Upper-Intermediate level.Personal qualities:
- Strong project and team management skills, with the ability to lead cross-functional teams and delegate effectively while staying hands-on when needed.
- Accountable and self-driven β you follow through without reminders.
- Solution-oriented - you bring problems with proposed solutions.
- Open to feedback, adaptable to change, and persistent when you believe in the idea.
- Fast and responsive - you act quickly, avoid overcomplicating, while thinking long-term.
- Data- and result-driven β you base decisions on facts and aim for real outcomes.
- Customer-focused β with a strong understanding of service mindset and what it means to create value for clients.
- Strong communicator β you align, clarify, and solve across all levels.
- High standards β you raise the bar, not settle for βgood enough.β
- Able to prioritize what truly creates value for the business.
Responsibilities:
Information Security & Risk Management:
- Develop and implement security policies, standards, and procedures.
- Manage access control and protect internal systems.
- Conduct risk assessments and monitor security threats.
- Respond to incidents and mitigate vulnerabilities.
- Educate employees on security best practices.
IT Systems & Infrastructure
- Maintain an optimized, scalable, and secure architecture, aligned with business priorities.
- Ensure system integration, data integrity, and interoperability across core platforms (CRM, ERP, HRM, etc.).
- Oversee technical operations teams to ensure efficient and secure operations.
- Drive automation and process improvements.
Automation & AI Initiatives
- Identify and implement high-impact automation and AI opportunities.
- Ensure effective integration of AI tools into business processes.
- Measure effectiveness and business impact of implemented solutions.
- Coordinate cross-functional automation initiatives and promote knowledge-sharing.
- Involve external expertise to strengthen outcomes where needed.
What we offer:
- Flexible schedule. You can work remotely or from our comfortable offices. The workday starts from 8:00 to 11:00;- Time Offs Loyalty System - 28 Business Days of Paid Time Off per year (after 3 months of cooperation);
- We care about your health. We guarantee that we will cover your medical insurance once your probation period is over. And once a year, we organize a flu shot;
- Mental Health webinars where we discuss psychological topics.
- Professional Growth and Development Personal Development Plan, internal educational activities, reimbursement of external educational activities, including the ones abroad.
- English Courses and Speaking Clubs;
- Corporate currency - Boosta coins and spend them on extra day-offs or our branded products (from T-shirts to AirPods).
What stages do we have:β’ 1st stage: pre-screen with recruiter;
β’ 2nd stage: interview with hiring manager;
β’ 3nd stage: test task
β’ 4nd stage: bar-raising
β’ 5th stage: referrals and offer.Apply now and become a Head of IT Operations & Security!
More -
Β· 40 views Β· 14 applications Β· 3d
Information Security Officer (ISO)
Full Remote Β· Worldwide Β· Product Β· 5 years of experience Β· IntermediateCompany: Developer of a B2C trading platform Company size: 150+ employees and growing Work format: remote Reporting to: CEO, close collaboration with CTO Why is this role exciting? This is a unique opportunity to build the security function from the...Company: Developer of a B2C trading platform
Company size: 150+ employees and growing
Work format: remote
Reporting to: CEO, close collaboration with CTO
Why is this role exciting?
This is a unique opportunity to build the security function from the ground up in a fast-growing tech company. Youβll be working in a young and friendly team, tackling real security challenges rather than focusing on compliance and certification. The company values practical and efficient security that brings real benefits to the business.
The role offers plenty of interesting challenges, room for professional growth, and the opportunity to set up the security function as needed. If youβre passionate about hands-on security, solving real-world security problems, and making an impact, this role is for you!
Responsibilities:
- Building a corporate information and cybersecurity system from scratch, aligning with business strategy and leadership expectations
- Identify security risks in business processes, evaluate, and prioritise mitigation controls
- Executethe cybersecurity roadmap with alignment to the emerging threats
- Implementing and managing access control (SSO, MFA, RBAC)
- Developing and enforcing information security policies for personal data protection (PII), information, and access management procedures
- Establishing vulnerability management processes
- Control network and application security resilience against attacks (DDoS, takeovers, injections, etc.),
- Developing and implementing workstation security with Mobile Device Management (MDM) policies and XDR tools
- Collaborating with IT and development teams on the platformβs security architecture, customer security aspects in products, and enabling DevSecOps
- Lead the security incident management process, orchestration, and control execution
Conducting security training and fostering a strong security culture
Requirements:
- 5+ years of experience in information security
- Strong knowledge in security frameworks such as ISO27000, NIST, SOC, CSI or similar
- Practical understanding of IAM, PII protection built into the operational process of the company
- Experience in setting up vulnerability and patch management processes
- Familiarity with security threats and mitigation practices for DDoS, brute forces, injections, etc.
- Experience in mobile security, anti-virus tools, and BYOD policies
- Understanding of DevSecOps and the secure software development concept
- Ability to design security processes from scratch and their adoption
- Practical knowledge of cryptocurrencies and the risks associated with crypto
- Excellent communication and reporting skills
- Agility in risk management
Nice to have:
- Experience in fintech companies or trading platforms
- Experience in implementing SOC, DLP, and SIEM
- Knowledge of compliance frameworks (GDPR, PCI DSS)
We offer flexibility in discussing terms, building a team, and providing the necessary resources to create a strong, practical security system that truly benefits the business.
More -
Β· 30 views Β· 5 applications Β· 3d
Information Security Manager
Full Remote Β· Ukraine Β· 3 years of experience Β· Upper-IntermediateJoin our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clientsβ digital assets. Responsibilities: Implement security measures in alignment with industry frameworks. Conduct security...Join our team as an Information Security Manager, where you will play a crucial role in ensuring the safety and integrity of our clientsβ digital assets.
Responsibilities:
- Implement security measures in alignment with industry frameworks.
- Conduct security assessments for client projects using established methodologies and provide actionable recommendations.
- Collaborate with development teams to identify risks and implement the most efficient security solutions.
- Promote security services by engaging with clients and presenting solutions.
Requirements:
- 3+ years of experience with security frameworks such as ISO 27001, SOC 2, or NIST CSF.
- Knowledge of cloud security, with practical experience, is a plus.
- Understanding of Secure SDLC and software security architecture is a plus.
- Ability to engage clients and provide expert security consulting.
- A structured approach to work and clear documentation skills.
- Ability to automate tasks using any programming language and AI tools.
- Upper-Intermediate English or higher.
Our benefits:
GROWTH & EDUCATION
- Individual development plan.
- Mentoring program.
- Evaluation process.
- Professional education.
- Covering the cost of professional certifications.
- Corporate library.
- English classes.
COMMUNITY
- Technological community.
- Volunteering & Charity.
- Yalantis events.
- Yalantis Education.
- Project team building activities.
WELLBEING
- Medical insurance, health check-ups, and compensation for sports activities are up to you.
- Vacation & Days Off.
- Mental health support program.
- Public holidays.
- Financial and legal support for private entrepreneurs.
WORK ENVIRONMENT
- Cozy offices (Dnipro, Kyiv, Warsaw).
- Corporate Top-notch equipment and quality tools.
- Flexible format of work.
- Eco & Pet-friendly space.
- Fun activities in offices.
- Y-bucks & Yalantis store.
Please note that feedback with the results of the CV review will be provided only in the event of a decision to consider your candidacy further.
More
Otherwise, your data will be retained in the companyβs CV database, and we will gladly contact you if a suitable vacancy becomes available. The consideration period is 7 working days. -
Β· 20 views Β· 2 applications Β· 3d
Cyber Security Lead
Office Work Β· Ukraine (Kyiv) Β· Product Β· 5 years of experience Β· Intermediate Ukrainian Product πΊπ¦Ajax Systems β ΡΠ΅ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Π° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Π° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΠΉ Π² ΠΠ²ΡΠΎΠΏΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊ Ρ Π²ΠΈΡΠΎΠ±Π½ΠΈΠΊ ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ajax ΡΠ· ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡΠΌΠΈ ΡΠΎΠ·ΡΠΌΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠΌΡ. Π¦Π΅ ΡΡΠ»Π° Π΅ΠΊΠΎΡΠΈΡΡΠ΅ΠΌΠ° Π·Ρ 180 ΠΏΡΠΈΡΡΡΠΎΡΠ², ΠΌΠΎΠ±ΡΠ»ΡΠ½ΠΈΡ Ρ Π΄Π΅ΡΠΊΡΠΎΠΏΠ½ΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², ΡΠ΅ΡΠ²Π΅ΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠΎΠΆΠ½ΠΎΠ³ΠΎ...Ajax Systems β ΡΠ΅ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½Π° ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΡΠ½Π° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, Π½Π°ΠΉΠ±ΡΠ»ΡΡΠΈΠΉ Π² ΠΠ²ΡΠΎΠΏΡ ΡΠΎΠ·ΡΠΎΠ±Π½ΠΈΠΊ Ρ Π²ΠΈΡΠΎΠ±Π½ΠΈΠΊ ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ajax ΡΠ· ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡΠΌΠΈ ΡΠΎΠ·ΡΠΌΠ½ΠΎΠ³ΠΎ Π΄ΠΎΠΌΡ. Π¦Π΅ ΡΡΠ»Π° Π΅ΠΊΠΎΡΠΈΡΡΠ΅ΠΌΠ° Π·Ρ 180 ΠΏΡΠΈΡΡΡΠΎΡΠ², ΠΌΠΎΠ±ΡΠ»ΡΠ½ΠΈΡ Ρ Π΄Π΅ΡΠΊΡΠΎΠΏΠ½ΠΈΡ Π·Π°ΡΡΠΎΡΡΠ½ΠΊΡΠ², ΡΠ΅ΡΠ²Π΅ΡΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠΎΠΆΠ½ΠΎΠ³ΠΎ ΡΠΎΠΊΡ ΠΌΠΈ Π΄Π΅ΠΌΠΎΠ½ΡΡΡΡΡΠΌΠΎ ΠΊΡΠ°ΡΠ½Π΅ Π·ΡΠΎΡΡΠ°Π½Π½Ρ ΡΠΊ Ρ ΡΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΡ ΠΊΠΎΠΌΠ°Π½Π΄ΠΈ, ΡΠ°ΠΊ Ρ Π² ΠΊΡΠ»ΡΠΊΠΎΡΡΡ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ² Ρ Π²ΡΡΠΎΠΌΡ ΡΠ²ΡΡΡ. ΠΠ°ΡΠ°Π·Ρ Π² ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π±ΡΠ»ΡΡΠ΅ 4 100 ΠΏΡΠ°ΡΡΠ²Π½ΠΈΠΊΡΠ². Π Π΄Π°ΡΡΠΈΠΊΠΈ Ajax ΠΎΡ ΠΎΡΠΎΠ½ΡΡΡΡ 3,5 ΠΌΠ»Π½ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ² Ρ Π±ΡΠ»ΡΡ Π½ΡΠΆ 187 ΠΊΡΠ°ΡΠ½Π°Ρ ΡΠ²ΡΡΡ.
Ajax Systems ΠΌΠ°Ρ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²ΠΎ ΠΏΠΎΠ²Π½ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Ρ: Π²ΡΠ΄ Π³Π΅Π½Π΅ΡΠ°ΡΡΡ ΡΠ΄Π΅ΠΉ ΡΠ° ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΏΡΠΎΡΠΎΡΠΈΠΏΡΠ² Π΄ΠΎ ΠΌΠ°ΡΠΎΠ²ΠΎΠ³ΠΎ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΡΠ²Π° ΡΠ° ΠΏΡΠΎΠ΄Π°ΠΆΡ ΠΏΠΎ Π²ΡΡΠΎΠΌΡ ΡΠ²ΡΡΡ. ΠΠΎΠΆΠ΅Π½ Π΄Π΅ΠΏΠ°ΡΡΠ°ΠΌΠ΅Π½Ρ Π·Π°ΠΊΡΠΈΠ²Π°Ρ ΠΏΠ΅Π²Π½Ρ ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½Ρ ΠΏΠΎΡΡΠ΅Π±Ρ Π±ΡΠ·Π½Π΅ΡΡ Π² ΠΏΠΎΠ²Π½ΡΠΉ ΠΌΡΡΡ. Π€Π°Ρ ΡΠ²ΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π·Π°Π»ΡΡΠ΅Π½Ρ Π½Π° Π²ΡΡΡ Π΅ΡΠ°ΠΏΠ°Ρ : Π²ΡΠ΄ Π²ΠΈΡΠΎΠ±Π½ΠΈΡΠΎΡ Π»ΡΠ½ΡΡ Π² Π£ΠΊΡΠ°ΡΠ½Ρ Π΄ΠΎ Π»ΠΎΠ³ΡΡΡΠΈΡΠ½ΠΎΠ³ΠΎ ΡΠ΅Π½ΡΡΡ Π² ΠΠΎΠ»ΡΡΡ, Π·Π²ΡΠ΄ΠΊΠΈ ΠΏΡΠΎΠ΄ΡΠΊΡΡΡ Π²ΡΠ΄ΠΏΡΠ°Π²Π»ΡΡΡΡ Π΄ΠΈΡΡΡΠΈΠ±ΚΌΡΡΠΎΡΠ°ΠΌ ΠΏΠΎ Π²ΡΡΠΎΠΌΡ ΡΠ²ΡΡΡ.
ΠΠΈ Π½Π°ΡΠ°Π·Ρ ΡΡΠΊΠ°ΡΠΌΠΎ Π΄ΠΎΡΠ²ΡΠ΄ΡΠ΅Π½ΠΎΠ³ΠΎ Π»ΡΠ΄Π΅ΡΠ° Π² ΡΡΠ΅ΡΡ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΊΠΈΠΉ Π±ΡΠ΄Π΅ ΡΠΏΡΠ°Π²Π»ΡΡΠΈ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ ΡΠ°Ρ ΡΠ²ΡΡΠ², Π΄ΠΎΠΏΠΎΠΌΠΎΠΆΠ΅ Π½Π°ΠΌ Π±ΡΠ΄ΡΠ²Π°ΡΠΈ ΡΠ° Π²Π΄ΠΎΡΠΊΠΎΠ½Π°Π»ΡΠ²Π°ΡΠΈ Π·Π°Ρ ΠΈΡΡ Π½Π°ΡΠΈΡ ΡΠΈΡΡΠ΅ΠΌ, Π΄Π°Π½ΠΈΡ Ρ ΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΡΠ². Π―ΠΊΡΠΎ Π²ΠΈ ΠΌΠ°ΡΡΠ΅ ΡΡΡΠ°ΡΠ΅Π³ΡΡΠ½Π΅ Π±Π°ΡΠ΅Π½Π½Ρ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΎΠ·ΡΠΌΡΡΡΠ΅ Π°ΠΊΡΡΠ°Π»ΡΠ½Ρ Π·Π°Π³ΡΠΎΠ·ΠΈ ΡΠ° Π³ΠΎΡΠΎΠ²Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΡΠ²Π°ΡΠΈ Π½Π°ΠΉΠΊΡΠ°ΡΡ ΠΏΡΠ°ΠΊΡΠΈΠΊΠΈ ΠΊΡΠ±Π΅ΡΠ·Π°Ρ ΠΈΡΡΡ β Π±ΡΠ΄Π΅ΠΌΠΎ ΡΠ°Π΄Ρ Π±Π°ΡΠΈΡΠΈ Π²Π°Ρ Ρ Π½Π°ΡΡΠΉ ΠΊΠΎΠΌΠ°Π½Π΄Ρ!
ΠΠΈΠΌΠΎΠ³ΠΈ:
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Ρ ΡΡΠ΅ΡΡ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²ΡΠ΄ 5 ΡΠΎΠΊΡΠ², Π· ΡΠΊΠΈΡ ΡΠΎΠ½Π°ΠΉΠΌΠ΅Π½ΡΠ΅ 2 ΡΠΎΠΊΠΈ Π½Π° ΠΊΠ΅ΡΡΠ²Π½ΠΈΡ Π°Π±ΠΎ Π»ΡΠ΄Π΅ΡΡΡΠΊΠΈΡ ΠΏΠΎΠ·ΠΈΡΡΡΡ .
ΠΠΎΡΠ²ΡΠ΄ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ ΡΠΏΠ΅ΡΡΠ°Π»ΡΡΡΡΠ² Π· ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΡΠΉ ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΠ°ΠΊΡΠΈΡΠ½ΠΈΠΉ Π΄ΠΎΡΠ²ΡΠ΄ Ρ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°Ρ ΠΎΠ΄ΡΠ² Π· ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π·ΠΎΠΊΡΠ΅ΠΌΠ° Ρ Π²Π΅Π»ΠΈΠΊΠΈΡ ΠΏΡΠ΄ΠΏΡΠΈΡΠΌΡΡΠ²Π°Ρ .
ΠΠ½Π°Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΌΡΠΆΠ½Π°ΡΠΎΠ΄Π½ΠΈΡ ΡΡΠ°Π½Π΄Π°ΡΡΡΠ² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (ISO 27001, NIST, SOC 2, GDPR, PCI DSS).
ΠΠΎΡΠ²ΡΠ΄ ΡΡΠ°ΡΡΡ Π² Π°ΡΠ΄ΠΈΡΠ°Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΡ Π΄ΠΎ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΡ.
ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠ° ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ (SIEM, SOAR, EDR, SOC).
ΠΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· Ρ ΠΌΠ°ΡΠ½ΠΈΠΌΠΈ ΠΏΠ»Π°ΡΡΠΎΡΠΌΠ°ΠΌΠΈ (AWS, Azure, Google Cloud) ΡΠ° ΡΡ Π½ΡΠΌΠΈ Π·Π°ΡΠΎΠ±Π°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΡΠΊΡΠ²Π°Π½Π½Ρ ΡΠΎΠ΄ΠΎ ΡΠ΅Ρ Π½ΡΡΠ½ΠΈΡ Π½Π°Π²ΠΈΡΠΎΠΊ:
ΠΠ»ΠΈΠ±ΠΎΠΊΠ΅ ΡΠΎΠ·ΡΠΌΡΠ½Π½Ρ ΡΠΎΠ±ΠΎΡΠΈ ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ², ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡ, Π°ΡΡ ΡΡΠ΅ΠΊΡΡΡΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠ½Π°Π½Π½Ρ ΡΠ° Π΄ΠΎΡΠ²ΡΠ΄ ΡΠΎΠ±ΠΎΡΠΈ Π· (ΡΠΎΠ½Π°ΠΉΠΌΠ΅Π½ΡΠ΅ 1 ΡΠ½ΡΡΡΡΠΌΠ΅Π½Ρ ΡΠ· Π±ΡΠ΄Ρ-ΡΠΊΠΎΡ ΠΊΠ°ΡΠ΅Π³ΠΎΡΡΡ):Firewall: Cisco ASA, Palo Alto Networks, Check Point, Fortinet.
MDM: Microsoft Intune, Jamf Pro, Kandji, VMware Workspace ONE, ManageEngine Endpoint Central.
SIEM: Splunk, IBM QRadar, ArcSight.
IDS/IPS: Snort, Suricata, Cisco Firepower.
DLP: Symantec DLP, McAfee DLP, Digital Guardian.
XDR/EDR: Crowdstrike Falcon, Carbon Black, SentinelOne.
PUM/PAM: CyberArk, BeyondTrust, Thycotic.
ΠΠΎΡΠ²ΡΠ΄ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π·Π°ΡΠΎΠ±ΡΠ² Π·Π°Ρ ΠΈΡΡΡ ΠΊΡΠ½ΡΠ΅Π²ΠΈΡ ΠΏΡΠΈΡΡΡΠΎΡΠ², ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ Π΄ΠΎΡΡΡΠΏΡ, ΡΠΈΡΡΡΠ²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ .
ΠΠ°Π²ΠΈΡΠΊΠΈ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ ΡΠ΅ΡΡΡΠ²Π°Π½Ρ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ ΡΠ° Π°Π½Π°Π»ΡΠ·Ρ Π²ΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉΠΠ°Π²Π΄Π°Π½Π½Ρ:
Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΡΡΠ°ΡΠ΅Π³ΡΡ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ Π²ΡΠ΄ΠΏΠΎΠ²ΡΠ΄Π½ΠΎ Π΄ΠΎ Π±ΡΠ·Π½Π΅Ρ-ΡΡΠ»Π΅ΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ.
Π£ΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ ΠΊΠΎΠΌΠ°Π½Π΄ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ» Π·Π°Π²Π΄Π°Π½Ρ ΡΠ° ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΡΡ Π²ΠΈΠΊΠΎΠ½Π°Π½Π½Ρ.
ΠΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ ΡΠ° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠ»ΡΡΠΈΠΊ Ρ ΠΏΡΠΎΡΠ΅Π΄ΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΡΠ½ΠΊΠ° ΡΠΈΠ·ΠΈΠΊΡΠ² ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ ΡΠ° ΡΠΎΠ·ΡΠΎΠ±ΠΊΠ° Π·Π°Ρ ΠΎΠ΄ΡΠ² ΡΠΎΠ΄ΠΎ ΡΡ ΠΌΡΠ½ΡΠΌΡΠ·Π°ΡΡΡ.
ΠΠΎΠ½ΡΡΠΎΠ»Ρ Π·Π° Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½ΡΠΌ ΡΠ° ΠΎΠ½ΠΎΠ²Π»Π΅Π½Π½ΡΠΌ ΡΠΈΡΡΠ΅ΠΌ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΡΠ³Π°Π½ΡΠ·Π°ΡΡΡ ΡΠ° ΠΊΠ΅ΡΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΠ°ΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ, ΡΠ΅Π°Π³ΡΠ²Π°Π½Π½Ρ Π½Π° Π·Π°Π³ΡΠΎΠ·ΠΈ ΡΠ° ΡΡΡΠ½Π΅Π½Π½Ρ Π½Π°ΡΠ»ΡΠ΄ΠΊΡΠ² Π°ΡΠ°ΠΊ.
ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ Π½Π°Π²ΡΠ°Π½Π½Ρ ΡΠ° ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΠΎΠ±ΡΠ·Π½Π°Π½ΠΎΡΡΡ ΠΏΠ΅ΡΡΠΎΠ½Π°Π»Ρ ΡΠΎΠ΄ΠΎ ΠΊΡΠ±Π΅ΡΠ±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
Π‘ΠΏΡΠ²ΠΏΡΠ°ΡΡ Π· Π²Π½ΡΡΡΡΡΠ½ΡΠΌΠΈ ΡΠ° Π·ΠΎΠ²Π½ΡΡΠ½ΡΠΌΠΈ Π°ΡΠ΄ΠΈΡΠΎΡΠ°ΠΌΠΈ, ΠΏΡΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π΄ΠΎ ΡΠ΅ΡΡΠΈΡΡΠΊΠ°ΡΡΠΉ ΡΠ° ΠΏΠ΅ΡΠ΅Π²ΡΡΠΎΠΊ.
ΠΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ SIEM, SOC, ΡΠ½ΡΠ΅Π³ΡΠ°ΡΡΡ ΡΠΈΡΡΠ΅ΠΌ ΠΌΠΎΠ½ΡΡΠΎΡΠΈΠ½Π³Ρ Π·Π°Π³ΡΠΎΠ·.
Π£ΡΠ°ΡΡΡ Ρ ΡΠΎΡΠ΅Π½Π·ΡΠΊ ΡΠΎΠ·ΡΠ»ΡΠ΄ΡΠ²Π°Π½Π½ΡΡ ΡΠ° Π°Π½Π°Π»ΡΠ· ΡΠ½ΡΠΈΠ΄Π΅Π½ΡΡΠ² Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ.
ΠΠΈ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΠΌΠΎ:
Π ΠΎΠ±ΠΎΡΡ Π² ΠΊΠΎΠΌΡΠΎΡΡΠ°Π±Π΅Π»ΡΠ½ΠΎΠΌΡ ΠΎΡΡΡΡ UNIT.City (ΠΠΈΡΠ²) Π°Π±ΠΎ ΠΠ°ΡΡΠ°Π²Π°. ΠΡΡΡ ΠΎΠ±Π»Π°ΡΡΠΎΠ²Π°Π½ΠΈΠΉ Π³Π΅Π½Π΅ΡΠ°ΡΠΎΡΠΎΠΌ ΡΠ° Π±ΠΎΠΌΠ±ΠΎΡΡ ΠΎΠ²ΠΈΡΠ΅ΠΌ.
ΠΡΡΡΡΠΉΠ½Π΅ ΠΏΡΠ°ΡΠ΅Π²Π»Π°ΡΡΡΠ²Π°Π½Π½Ρ Π·Ρ ΡΡΠ°Π±ΡΠ»ΡΠ½ΠΎΡ ΠΎΠΏΠ»Π°ΡΠΎΡ ΡΠ° Π²ΡΡΠΌΠ° Π³Π°ΡΠ°Π½ΡΡΡΠΌΠΈ ΠΡΡ.City ΡΠ΅Π·ΠΈΠ΄Π΅Π½ΡΠ°.
ΠΠ½ΡΡΠΊΠΈΠΉ Π³ΡΠ°ΡΡΠΊ Π±Π΅Π· ΠΏΡΠΈΠ²βΡΠ·ΠΊΠΈ Π΄ΠΎ ΡΠΎΠ±ΠΎΡΠΈΡ Π³ΠΎΠ΄ΠΈΠ½.
ΠΠ°Π½ΡΡΡΡ Π°Π½Π³Π»ΡΠΉΡΡΠΊΠΎΡ.
ΠΠ΅Π΄ΠΈΡΠ½Π΅ ΡΡΡΠ°Ρ ΡΠ²Π°Π½Π½Ρ.
ΠΡΠ°ΠΉΠ²ΠΎΠ²Ρ ΠΊΠΎΠΌΠ°Π½Π΄Ρ ΡΠ° zero bullshit culture.
-
Β· 37 views Β· 2 applications Β· 3d
Middle Anti-Fraud manager
Full Remote Β· Worldwide Β· Product Β· 3 years of experience Β· Upper-IntermediateResponsibilities: Establish and lead the anti-fraud department, including recruiting, training, and managing a team of fraud analysts. Develop and implement robust processes for reviewing player activity before payouts, ensuring compliance with...- Responsibilities:
Establish and lead the anti-fraud department, including recruiting, training, and managing a team of fraud analysts. - Develop and implement robust processes for reviewing player activity before payouts, ensuring compliance with established rules and policies.
- Set up and optimize tools and systems to detect, analyze, and prevent fraudulent activity.
- Collaborate with payment, compliance, and support teams to handle escalated cases and improve overall operational security.
- Monitor player behavior and trends to identify potential fraud patterns and adjust preventive measures accordingly.
- Define and track key performance indicators (KPIs) for the department to ensure efficiency and effectiveness.
- Conduct regular audits and reviews of processes to identify areas for improvement and implement best practices.
- Stay updated on industry trends, fraud tactics, and technological advancements to continuously enhance the departmentβs capabilities.
- Provide regular reports on department performance, fraud incidents, and implemented solutions to stakeholders.
- Establish and enforce clear rules and guidelines for payout approvals to minimize fraud risks.
Required Skills:
- Proven experience in building and managing anti-fraud teams, preferably in the iGaming.
- Deep understanding of fraud prevention tools, systems, and best practices.
- Analytical mindset with expertise in data analysis and pattern recognition to identify fraudulent activities.
- Experience in implementing anti-fraud measures tailored to payouts and player activity reviews.
- Knowledge of U.S. regulations and compliance requirements is an advantage.
What We Offer: - The opportunity to build a department from the ground up and shape its future.
- A collaborative and innovative work environment focused on growth and success.
- Competitive salary.
The chance to make a significant impact on a high-profile project in a key market.
- Responsibilities:
-
Β· 12 views Β· 0 applications Β· 3d
WEB Assessment Engineer
Ukraine Β· Product Β· 3 years of experience Β· IntermediateSamsung R&D Institute Ukraine is looking for a passionate and collaborative WEB Security Assessment engineer to join our team. You will be involved in preventive security review and penetration testing of our online solutions in use by hundreds of...Samsung R&D Institute Ukraine is looking for a passionate and collaborative WEB Security Assessment engineer to join our team.
You will be involved in preventive security review and penetration testing of our online solutions in use by hundreds of millions of users worldwide.
If you love working directly on consumer-facing products we are glad to meet you at our team of professionals in Samsung R&D Institute Ukraine.
More specifically you will:
- perform vulnerability assessments of Samsung online services
- make blackbox penetration testing of production WEB services and server infrastructure
- make blackbox/greybox security validation of cloud infrastructure
- make blackbox penetration testing of enterprise IT infrastructure
- engage in emerging threats research: new attack methods, threat modelling, security bug hunting
Major Requirements:
- BlackBox and WhiteBox WEB pen.testing and vulnerability assessment experience
- BlackBox pen.test experience of cloud infrastructures and services
- OWASP Top-10: understanding of common Web Application vulnerabilities
- DB: understanding of database operation (pref. PostgreSQL, MongoDB, MySQL, SQLite, MS SQL)
- technical English (strong reporting skills, ability to communicate with colleagues worldwide)
Optional Requirements:
- security background (relevant University education, relevant prior employment, community activities, CTF participation)
- cryptography: understanding of crypto primitives and protocols (SSL/TLS, authentication & authorization protocols, crypto algs.)
- strong understanding of REST, SOAP operation
- pen.test experience of solutions hosted on popular cloud platforms (Alibaba, GCP, Azure, AWS)
- toolset: hands-on experience with Burp, scripting (Python), assessment automation tools (fuzz, scan)
- network security: understanding of WAF, CDN, IPS/IDS operation and weaknesses
- understanding of Devices-to-Cloud Services assessment principles
- understanding of OSINT tools and techniques
Working Conditions:
- official employment - GIG contract
- remote work is possible as well as work in Kyiv office
Benefits:
- competitive salary, annual salary review, annual bonuses
- paid 28 work days of annual vacations and sick leaves
- opportunity to become an inventor of international patents with paid bonuses
- medical & life insurance for employees and their children
- paid lunches
- discounts to Samsung products, services
- regular education and self-development on internal courses and seminars
- hybrid work format, working in office is required for some tasks
More -
Β· 11 views Β· 0 applications Β· 3d
Software Penetration Tester
Ukraine Β· Product Β· 3 years of experience Β· IntermediateVulnerability assessment and penetration testing of various Linux OS security components and mechanisms: - vulnerability assessment of Samsung mobile security software: security source code review (white box) and binary analysis (black box) - secure...Vulnerability assessment and penetration testing of various Linux OS security components and mechanisms:
- vulnerability assessment of Samsung mobile security software: security source code review (white box) and binary analysis (black box)
- secure SDLC process support (including requirements, design security review)
- emerging threats research: new attack methods, (un)known security issues risks
Major Requirements:
- 2+ years of hands-on experience with white and black box software penetration testing and vulnerability assessment
- understanding of typical software security issues (memory corruptions, various injections, arithmetic overflows, etc.) and how to protect against them
- good experience with C/C++, scripting languages, assembly (Arm preferred)
- ability to document and describe discovered security issues
Optional Requirements:
- exploitation experience
- understanding of Linux security architecture and design flaws exploitation (privilege escalation, MAC/DAC Passover oth.).
- Rust language knowledge
- tools: experience with fuzzers, disassemblers, debuggers, assessment automation tools
- cryptography: exploitation experience (weak keys, bruteforce, weak crypto, etc.)
- experience with assessing protected solutions (obfuscated / packed code)
Working Conditions:
- official employment - GIG contract
- remote work is possible as well as work in Kyiv office
Benefits:
- competitive salary, annual salary review, annual bonuses
- paid 28 work days of annual vacations and sick leaves
- opportunity to become an inventor of international patents with paid bonuses
- medical & life insurance for employees and their children
- paid lunches
- discounts to Samsung products, services
- regular education and self-development on internal courses and seminars
- hybrid work format, working in office is required for some tasks
More