Enter the world of ING Tech Poland. Join the team of professionals and implement with us international IT projects.
Every day we work with the finest technologies: Linux, RedHat, Docker, Puppet, Kafka, Zerto, NGNIX, GitLab, Angular, Tomcat, Hadoop, Nessuss, Java, Apache, ServiceNow, ElasticSearch, Vmware, .Net and many more. The possibility of working with modern technology gives great satisfaction. Besides, it gives you a lot of experience.
Directional education (risk management, safety) English at B2/C1 level, Experience in domains: Access Control, Physical (Environmental) Security, Ability to prepare and give opinions on documentation related to physical safety, Knowledge of the physical security market, including: access control platforms, SSWiN and CCTV, Ability to conduct inspections and tests related to access and physical security, Experience in the implementation of tools supporting physical safety management and subsequent operation of these tools, Ability to coordinate and document activities related to the handling of security incidents, Support in planning and conducting physical security audits in the organizationSee more »
Higher education (or in progress) - preferred IT profile, Knowledge of one of the technologies listed above: Windows, UNIX, Red Hat Linux, Oracle, SQL Server, Knowledge of English, which will enable projects to be carried out in an international environment, Enthusiasm and willingness to develop in the area of IT Security, Ability to work in a teamSee more »
Master’s, university or bachelor degree in Computer Science and/or IT Security; Minimum of two technical certifications in area of IT Security (e.g. CISSP), IT Audit (e.g. CISA), Operating Systems, Databases or IT Networks; At least 3 years of professional experience in an IT organisation as IT Security specialist, IT Auditor or Technical IT specialist; Highly proficient in spoken and written English; Willingness to travel abroad between 9 to 12 weeks per year, divided in periods of 2-3 weeks per assignment.See more »
Very good knowledge of IT security issues at a technical level, Very good knowledge of the mechanisms of vulnerabilities in applications such as SQL Injection, Cross-Site Scripting and other posted on the OWASP Top 10 Vulnerabilities, Skills in the use of vulnerabilities detected, Good knowledge of issues related to the emergence of vulnerabilities and their prevention at the level of IT infrastructure, Good knowledge of cryptographySee more »
Important: this site uses cookie files.
We use information saved in cookie files, among others, in statistical purposes and in order to fit the service to individual needs of the user. In your browser you can change your cookie files settings. Using the site without changing cookie files settings means they will be saved in device memory. More information with tips how to change settings can be found in Cookies policy.