E VULNERABILITY ASSESSMENT
• Metodologie di penetration testing
• Valutazione delle vulnerabilità
• Reporting e mitigazione
MOD. VI – ANALISI E RISPOSTA AGLI INCIDENTI
• Identificazione e classificazione degli incidenti
• Strumenti di SIEM (SecurityInformation...
delivers Order Entry' Inside Sales and Administration activities' as well as acting as one of the main pre- and after-sales customer contact points' responsible for managing fast and effective exchange of commercial information between Sales' Distributors...
DeepInspect's solution embodies simplification by transforming a complex problem into an easy solution. The idea stems from the need to guarantee security monitoring in order to protect critical infrastructures, and the industrial sector, in general...
ambientale (ISO 14001)
Conoscenza di base di InformationSecurity Management System (ISO 27001)
Disponibilità a trasferte occasionali in Europa (circa 1 volta al mese o ogni 2 mesi)
Iscrizione alle Categorie Protette (art.1 L.68/99) ALTRE...
and InformationSecurity Management Systems, ICH GCP guidelines, applicable local and international legislation, including data protection legislation, as well as any amendments or updates the above
• In case of deviation from the approved protocol, ICH GCP...
feature stores - Security &, Compliance: OAuth2' OIDC' secrets management' zero-trust architecture' GDPR/PCI/SOC2 frameworks Additional Information How we work together: - An inclusive' friendly' and international environment (you'll be working with...
ownership from idea to deployment
• writing documentation only when needed' and focusing on what works.
• Strong technical troubleshooting: You can quickly find the cause of technical issues using logs' dev tools' or pattern matching.
• Security-aware mindset...
like Chrome DevTools' log aggregators' and regex. - Collaboration: Clear communication' teamwork skills' and experience with Git and agile development. - Security awareness: Understand access permissions' API tokens' and how to manage secrets...