Enter the world of ING Tech Poland. Join the team of professionals and implement with us international IT projects.
Every day we work with the finest technologies: Linux, RedHat, Docker, Puppet, Kafka, Zerto, NGNIX, GitLab, Angular, Tomcat, Hadoop, Nessuss, Java, Apache, ServiceNow, ElasticSearch, Vmware, .Net and many more. The possibility of working with modern technology gives great satisfaction. Besides, it gives you a lot of experience.
University degree or last year's student (maths, computer science, physics or related fields of study); Knowledge of the basics of programming and ability to use them to learn new languages and technologies; English speaking that enables you to communicate effectively with foreign partners and to read and write technical documentation; You want to co-create and develop fraud detection systems in the areas of payment cards, e-banking and others; High analytical skills to analyze transactional data and find patterns in it that determine customer or fraudulent behavior; Ability to create SQL queries; Knowledge of the Office package; You are accurate, you pay attention to details, you have the ability to find errors; Looking for creative and optimal solutions to your problems; You can create simple tools to improve tedious operations, e.g. VBA macrosSee more »
Master’s, university or bachelor degree in Computer Science and/or IT Security; Minimum of two technical certifications in area of IT Security (e.g. CISSP), IT Audit (e.g. CISA), Operating Systems, Databases or IT Networks; At least 3 years of professional experience in an IT organisation as IT Security specialist, IT Auditor or Technical IT specialist; Highly proficient in spoken and written English; Willingness to travel abroad between 9 to 12 weeks per year, divided in periods of 2-3 weeks per assignment.See more »
Very good knowledge of IT security issues at a technical level, Very good knowledge of the mechanisms of vulnerabilities in applications such as SQL Injection, Cross-Site Scripting and other posted on the OWASP Top 10 Vulnerabilities, Skills in the use of vulnerabilities detected, Good knowledge of issues related to the emergence of vulnerabilities and their prevention at the level of IT infrastructure, Good knowledge of cryptographySee more »
Important: this site uses cookie files.
We use information saved in cookie files, among others, in statistical purposes and in order to fit the service to individual needs of the user. In your browser you can change your cookie files settings. Using the site without changing cookie files settings means they will be saved in device memory. More information with tips how to change settings can be found in Cookies policy.