108 views
T-Mobile Polska
We offer:
Cybersecurity is an extremely important element of work in telecommunications, because our priority is to protect our clients' data. We observe the network 24/7 and monitor anomalies, while protecting the State's Critical Infrastructure.
We prevent and immediately respond to all threats. Every day we influence the security of millions of users of our network by providing them with services with the highest level of security.
We approach security issues strategically and globally, counteract hacker attacks, and create a unique environment for the development of new, innovative solutions and products in the detection of fraud, cyber threats and business process monitoring.
What does the recruitment process look like?
1. CV analysis
2. Meeting with the Recruiter
3. Meeting with the Manager
4. Welcome to T-Mobile :)
We offer:
Cybersecurity is an extremely important element of work in telecommunications, because our priority is to protect our clients' data. We observe the network 24/7 and monitor anomalies, while protecting the State's Critical Infrastructure.
We prevent and immediately respond to all threats. Every day we influence the security of millions of users of our network by providing them with services with the highest level of security.
We approach security issues strategically and globally, counteract hacker attacks, and create a unique environment for the development of new, innovative solutions and products in the detection of fraud, cyber threats and business process monitoring.
What does the recruitment process look like?
1. CV analysis
2. Mete with the Recruiter
3. Meeting with the Manager
4. Welcome to T-Mobile :)
, [Maintaining and evaluating the vulnerability scanning and detection architecture, Identification and assessment of vulnerabilities in the enterprise infrastructure, Vulnerability lifecycle management, from detection to assessment, reporting, escalation, repair and verification, Cooperation with application and infrastructure teams to advise and assist in remediating vulnerabilities within appropriate timeframes and tracking remediation activities] Requirements: API, Nessus, Windows, Linux, LAN , CISSP, CISM, CISA, Kanban, ISO, WAF, IPS, DLP, EDR