Current job offers

Enter the world of ING Tech Poland. Join the team of professionals and implement with us international IT projects.

Every day we work with the finest technologies: Linux, RedHat, Docker, Puppet, Kafka, Zerto, NGINX, GitLab, Angular, Tomcat, Hadoop, Nessuss, Java, Apache, ServiceNow, ElasticSearch, Vmware, .Net and many more. The possibility of working with modern technology gives great satisfaction. Besides, it gives you a lot of experience.

Results (6)

  • IT Security Analyst

    Knowledge of Visual Basic/ SQL/ Python; Ability to work with large data sets; Knowledge of the process and methodology of software development and testing; Very good communication skills in English (min. B2).

    See more »
  • Cyber Threat Analyst

    You have good knowledge of IT security issues, you understand threats in OWASP - Top10. 

    See more »
  • Cyber Security Defender - Linux

    2 years of proven experience in working with Linux (RHEL) systems, 2 years of proven experience in working with virtualization technologies

    See more »
  • Cyber Security Defender (Network)

    Knowledge of network protocols (TCP, UDP, ICMP), Knowledge of application layer protocols, VPN and cryptographic techniques, Knowledge of IDS/IPS systems.

    See more »
  • Senior IT Auditor

    Master’s, university or bachelor degree in Computer Science and/or IT Security; Minimum of two technical certifications in area of IT Security (e.g. CISSP), IT Audit (e.g. CISA), Operating Systems, Databases or IT Networks; At least 3 years of professional experience in an IT organisation as IT Security specialist, IT Auditor or Technical IT specialist; Highly proficient in spoken and written English; Willingness to travel abroad between 9 to 12 weeks per year, divided in periods of 2-3 weeks per assignment.

    See more »
  • Penetration Tester

    Very good knowledge of IT security issues at a technical level, Very good knowledge of the mechanisms of vulnerabilities in applications such as SQL Injection, Cross-Site Scripting and other posted on the OWASP Top 10 Vulnerabilities, Skills in the use of vulnerabilities detected, Good knowledge of issues related to the emergence of vulnerabilities and their prevention at the level of IT infrastructure, Good knowledge of cryptography

    See more »

Important: this site uses cookie files.

We use information saved in cookie files, among others, in statistical purposes and in order to fit the service to individual needs of the user. In your browser you can change your cookie files settings. Using the site without changing cookie files settings means they will be saved in device memory. More information with tips how to change settings can be found in Cookies policy.

I agree   I disagree