E VULNERABILITY ASSESSMENT
• Metodologie di penetration testing
• Valutazione delle vulnerabilità
• Reporting e mitigazione
MOD. VI – ANALISI E RISPOSTA AGLI INCIDENTI
• Identificazione e classificazione degli incidenti
• Strumenti di SIEM (SecurityInformation...
EfficientIP is a network automation and security company, specializing in DNS-DHCP-IPAM solutions (DDI), with the goal to help organizations worldwide to drive business efficiency through agile, secure and reliable infrastructure foundation.
BDRs...
DeepInspect's solution embodies simplification by transforming a complex problem into an easy solution. The idea stems from the need to guarantee security monitoring in order to protect critical infrastructures, and the industrial sector, in general...
di Cybersecurity.
Entrare a far parte del team di Cybersecurity di Protiviti consente di lavorare su progetti di:
• Security Program & Strategy: supporto alla definizione e al mantenimento di strategie e modelli di InformationSecurity;
• Incident Response...
and InformationSecurity Management Systems, ICH GCP guidelines, applicable local and international legislation, including data protection legislation, as well as any amendments or updates the above
• In case of deviation from the approved protocol, ICH GCP...
delivers Order Entry' Inside Sales and Administration activities' as well as acting as one of the main pre- and after-sales customer contact points' responsible for managing fast and effective exchange of commercial information between Sales' Distributors...
ambientale (ISO 14001)
Conoscenza di base di InformationSecurity Management System (ISO 27001)
Disponibilità a trasferte occasionali in Europa (circa 1 volta al mese o ogni 2 mesi)
Iscrizione alle Categorie Protette (art.1 L.68/99) ALTRE...
Il background del/la candidato/a ideale:
• Ha maturato almeno 5 anni di esperienza nell’ambito dell’Information Technology
• Ha un’esperienza di almeno 3 anni sulla metodologia ITIL.
• Conosce le tecniche di sviluppo e gestione sia delle componenti applicative...
like Chrome DevTools' log aggregators' and regex. - Collaboration: Clear communication' teamwork skills' and experience with Git and agile development. - Security awareness: Understand access permissions' API tokens' and how to manage secrets...
ownership from idea to deployment
• writing documentation only when needed' and focusing on what works.
• Strong technical troubleshooting: You can quickly find the cause of technical issues using logs' dev tools' or pattern matching.
• Security-aware mindset...
feature stores - Security &, Compliance: OAuth2' OIDC' secrets management' zero-trust architecture' GDPR/PCI/SOC2 frameworks Additional Information How we work together: - An inclusive' friendly' and international environment (you'll be working with...