
Search by job, company or skills
Showing 9 jobs
Skills:
Google Cloud Platform, Networking Concepts, Python, security engineering, developing threat models, Security Protocols, Go, technical security assessments, computer and network security
Skills:
vulnerability research , threat modeling , Shell Scripting, Code Review, Ruby On Rails, Git, Burpsuite, Application Security, Owasp Top 10, Application Penetration Testing, Go, CVSS Scoring, Brakeman
Skills:
DAST, Penetration Testing, Vulnerability Management, Risk assessments, Detection-as-code, Offensive security, IaC scanning, Image scanning, Security automation scripts, SCA, Security Architecture, SAST, Secrets scanning, MDM solutions
Skills:
business impact analysis , packet capture , Identity And Access Management, Compliance with policies and standards, System Impact Analysis, Incident response handling, Security Assessments, Activity review, Customer Impact Analysis, Privileged access monitoring, Automation orchestration
Skills:
Google Cloud Platform, network security, Python, Security Protocols, Go, technical security assessments
Skills:
threat management , Sql Injection, Threat Hunting, Penetration Testing, Iso 27001, Itil, Incident Response, Web Application Security, Xss, Siem, Owasp Top 10, cloud security, Malware Analysis, Digital Forensics, Vulnerability Management, Threat Intelligence, EDR technologies, SOAR, Cobit, threat detection, nist, SOC operations

Skills:
Threat Intelligence, Digital Forensics, Itil, Vulnerability Management, Cloud security, Incident Response, Penetration Testing, Threat Hunting, Iso27001, Malware Analysis, ISO17799, Cross-site Scripting, Cobit, SQL injections, IT Security policy formulation, Cybersecurity compliance, nist
Skills:
virtualization, Ips, Network Protocols, Firewalls, Iso 27001, Perl, Iam, Ids, Python, common criteria, Pim, AV, nist, Mobile Technologies, IEC 62443
Skills:
.NET, openvas , Java, Wireshark, PowerShell, Kali Linux, Javascript, Perl, Nmap, Python, Linux shell, medical device security testing, application and product security, OWASP Top 10 Web Application Vulnerabilities
