
Search by job, company or skills
Showing 8 jobs
Skills:
DAST, Penetration Testing, Vulnerability Management, Risk assessments, Detection-as-code, Offensive security, IaC scanning, Image scanning, Security automation scripts, SCA, Security Architecture, SAST, Secrets scanning, MDM solutions
Skills:
threat management , Sql Injection, Threat Hunting, Penetration Testing, Iso 27001, Itil, Incident Response, Web Application Security, Xss, Siem, Owasp Top 10, cloud security, Malware Analysis, Digital Forensics, Vulnerability Management, Threat Intelligence, EDR technologies, SOAR, Cobit, threat detection, nist, SOC operations

Skills:
Threat Intelligence, Digital Forensics, Itil, Vulnerability Management, Cloud security, Incident Response, Penetration Testing, Threat Hunting, Iso27001, Malware Analysis, ISO17799, Cross-site Scripting, Cobit, SQL injections, IT Security policy formulation, Cybersecurity compliance, nist
Skills:
DevSecOps, Penetration Testing, Vulnerability Scanning, Security Testing, Source Code Review, Vulnerability Management, LLM security testing, Risk Assessment, AI-assisted tools
Skills:
security automation , Python, automation, Bash, Infrastructure Security, Scripting, Vulnerability Management, security engineering, risk management, system hardening, security tool operations
Skills:
VMware, Vcp, Vpns, Switches, Ccna, Windows, MCSE, Firewalls, Servers, Docker, Routers, Vulnerability Management, Linux, Network Devices, Kubernetes, Rhce, Hyper-V, Patching, network environments, virtualization technologies, Access Control, Security Systems, infrastructure security practices, cloud platforms
Skills:
Vulnerability Management, Ips, CSPM, DevSecOps, Gcp, Ids, Siem, Waf, Penetration Testing, Azure, Kubernetes, AWS
Skills:
Antivirus, Vulnerability Scanning, Performance Tuning, network access control and management, network security firewall configuration, Security Information Management Tool, network hardware software troubleshooting, Network enforcement tools, switching and routing configuration, vulnerability assessment and remediation, SIEM and Log management, cross vendor network security products
