Cybersecurity experts and Pentesters

11/09/2020 | Relocalizar Suecia

DESCRIPTION

We are now looking for Cybersecurity experts, Pentesters and Cloud (Google/Azure) Security engineers. To be successful in the role, we expect that you have experience of the relevant security domains in combination with the capability to communicate this to stakeholders in a clear and concise way. We believe that you are used to managing highly confidential information and to act with a strict level of professional discretion. We work together to achieve our goals and always strive to utilize the talent of every individual optimally. We develop our people and our business equally to ensure that we can continue to provide a better everyday life for the many people for a long time to come. We believe that continuous learning is important to grow, both as persons and as professionals. To empower ourselves to thrive, we’re able to attend both trainings and conferences. CyberSecurity requirements and responsibilities:: Development experience in multiple programming languages and frameworks Good understanding of software security Good understanding of modern and agile software development Secure Software Development Lifecycle (Secure SDLC) Code Reviews Threat Modeling OWASP / BSIMM or similar “frameworks” for software security Static/Dynamic/Interactive Code and 3rd party analysis tools and processes Penetration Testing requirements and responsibilities: Penetration testing Ability to assess and deploy testing tools and testing methodology, deploying the right ones as part of the planning to identify vulnerabilities that automated tools may not see. Taking lead in the Security and Privacy Incident Response to incidents, working with product and infrastructure teams to ensure both a proper technical response as well as securing that the regulatory related activities are executed as required. Security in the Cloud DevSecOps Cloud native security frameworks and controls Hands-on experience of building large-scale, secure cloud-based solutions Embedded systems, IoT and Hardware based attacks Cryptography

MUST HAVE

NICE HAVE

SEND YOUR APPLICATION


    Our clients