On Hold / Closed
#3055
Security Operations Engineer
Hire Bonus
$$$
Login to get bonus for Hire!
Key skills: 2+ information security / UNIX / LINUX / SDLC / PCI DSS, ISO 27001 / information security tools (EndpointProtection, IDS / IPS, Network Security Scanner, Web application security scanner)
Requirements:
- 2 years of practical experience in the field of information security
- higher education in computer science or at least 5 years of practical experience
- practical experience with various information security tools (EndpointProtection, IDS / IPS, Network Security Scanner, Web application security scanner, IDS, DLP etc)
- practical experience setting UNIX / LINUX security settings
- knowledge of the basics of SDLC
- knowledge of the basics of building and operating networks
- practical experience in documenting, examining digital evidence and investigating information security incidents
- good understanding of international and industry security standards PCI DSS, ISO 27001
Will be a plus:
- practical experience in administering Linux-based infrastructure administration
- practical experience in administering network infrastructure and services
- practical experience in administering SQL infrastructure NOSQL databases
- practical experience with cloud providers AWS and GC or DO
- participation in projects to prepare the company’s infrastructure for compliance with international and industry safety standards — PCI DSS, ISO 27001 etc
- penetration testing experience
- practical experience with Docker, Kubernetes
We offer:
- work that inspires (dynamic product company, ability to see tangible results of your efforts on weekly basis)
- competitive compensation level
- understanding and experience in blockchain field
- strong focus on customers’ data security
- personal productivity over bureaucracy
- Apple equipment (MacBook Pro, 27-inch monitors)
- brand new, spacious and cosy office on the left bank (3 min. from Poznyaki subway station)
- paid vacations and sick-leave
Duties:
- development of internal standards for the secure configuration of information systems
- development of internal security standards for computer networks
- checking information systems for vulnerabilities
- control access to information systems
- administration and monitoring of information security systems (EndpointProtection, DLP, IDS, etc.)
- monitoring information security events
- development and implementation of new methods for identifying information security events
- participation in information security incident investigations
- participation in projects to prepare the company’s infrastructure for PCI DSS compliance