PREMIUM
... protocols (TCP IP, UDP, HTTP, etc.) Understanding of key handling, certificates and root authorities Excellent understanding of AWS IAM, JWT Tokens Experience with web security scanning tools (such as Burp ... -edge technologies, align your work with your ...
www.adzuna.pl
18 000 - 28 000 PLN net/month
PREMIUM
... predict network failures, bottlenecks, and security threats. Develop proactive maintenance based ... and telemetry protocols. Knowledge of IP networking (routing, switching) and Optical network technologies (DWDM, fiber optics) Desirable modelling ...
www.adzuna.pl
Undisclosed Salary
PREMIUM
... non-technical stakeholders. Supports IT Security incident management process and provides a thorough post-event analysis. Technical Leadership: Stay up to date on the latest cybersecurity trends, vulnerabilities, and technologies to guide the team in ...
www.adzuna.pl
Undisclosed Salary
PREMIUM
... business applications including security configuration and integrations; Propose, devise ... ensure compliance with security and operational requirements; Participates in ... , best practice approach, technology efficiency, and effectiveness; Knowledge of ...
www.adzuna.pl
14 000 - 18 130 PLN net/month
PREMIUM
... , local group policy management, OS security hardening, OS performance issues troubleshooting, ... to work with cutting-edge technologies, align your work with your ...
www.adzuna.pl
Undisclosed Salary
... protocols (TCP IP, UDP, etc.) Understanding of key handling, certificates and root authorities Excellent understanding of AWS IAM, JWT Tokens Experience with web security scanning tools (such as Burp ... cutting-edge technologies, align your work with your ...
pl.jooble.org
... predict network failures, bottlenecks, and security threats. Develop proactive maintenance based ... and telemetry protocols. Knowledge of IP networking (routing, switching) and Optical network technologies (DWDM, fiber optics) Desirable modelling ...
pl.jooble.org
... non-technical stakeholders. Supports IT Security incident management process and provides a thorough post-event analysis. Technical Leadership: Stay up to date on the latest cybersecurity trends, vulnerabilities, and technologies to guide the team in ...
pl.jooble.org
... business applications including security configuration and integrations; Propose, devise ... ensure compliance with security and operational requirements; Participates in ... , best practice approach, technology efficiency, and effectiveness; Knowledge of ...
pl.jooble.org
... , local group policy management, OS security hardening, OS performance issues troubleshooting, ... to work with cutting-edge technologies, align your work with your ...
pl.jooble.org