Enter the world of ING Tech Poland. Join the team of professionals and implement with us international IT projects.
Every day we work with the finest technologies: Linux, RedHat, Docker, Puppet, Kafka, Zerto, NGINX, GitLab, Angular, Tomcat, Hadoop, Nessuss, Java, Apache, ServiceNow, ElasticSearch, Vmware, .Net and many more. The possibility of working with modern technology gives great satisfaction. Besides, it gives you a lot of experience.
You have at least two years of experience in administering network devices; Names such as NGFW, WAF, Load Balancer, VPN, IPS are familiar to you; You are interested in IT security; You want to start a new career path from the security department of a large financial institutionSee more »
You have at least five years of experience in administration or designing solutions based on at least one of the following technologies: Linux, Windows Server, enterprise virtualization platforms, databases (Oracle, MS SQL), Middleware; You have knowledge about IT security and you want to develop in this area; You want to gain experience in the security department of a large financial institutionSee more »
You have at least five years of experience in the administration and design of computer networks; You have experience in administration and configuration of devices such as NGFW, WAF, Load Balancer, VPN, IPS, switches and routers; You have knowledge about IT security and want to develop in this area; You want to gain experience in the security department of a large financial institutionSee more »
Master’s, university or bachelor degree in Computer Science and/or IT Security; Minimum of two technical certifications in area of IT Security (e.g. CISSP), IT Audit (e.g. CISA), Operating Systems, Databases or IT Networks; At least 3 years of professional experience in an IT organisation as IT Security specialist, IT Auditor or Technical IT specialist; Highly proficient in spoken and written English; Willingness to travel abroad between 9 to 12 weeks per year, divided in periods of 2-3 weeks per assignment.See more »
Very good knowledge of IT security issues at a technical level, Very good knowledge of the mechanisms of vulnerabilities in applications such as SQL Injection, Cross-Site Scripting and other posted on the OWASP Top 10 Vulnerabilities, Skills in the use of vulnerabilities detected, Good knowledge of issues related to the emergence of vulnerabilities and their prevention at the level of IT infrastructure, Good knowledge of cryptographySee more »
Important: this site uses cookie files.
We use information saved in cookie files, among others, in statistical purposes and in order to fit the service to individual needs of the user. In your browser you can change your cookie files settings. Using the site without changing cookie files settings means they will be saved in device memory. More information with tips how to change settings can be found in Cookies policy.