Next job

Vulnerability Management - Tribe Security @ T-Mobile Polska in T-Mobile Polska

Posted more than 30 days ago

108 views

T-Mobile Polska

T-Mobile Polska

0
0 reviews
Without experience
Warsaw
Full-time work

Translated by Google

We offer: Cybersecurity is an extremely important element of work in telecommunications, because our priority is to protect our clients' data. We observe the network 24/7 and monitor anomalies, while protecting the State's Critical Infrastructure. We prevent and immediately respond to all threats. Every day we influence the security of millions of users of our network by providing them with services with the highest level of security. We approach security issues strategically and globally, co

We offer:

Cybersecurity is an extremely important element of work in telecommunications, because our priority is to protect our clients' data. We observe the network 24/7 and monitor anomalies, while protecting the State's Critical Infrastructure.

We prevent and immediately respond to all threats. Every day we influence the security of millions of users of our network by providing them with services with the highest level of security.

We approach security issues strategically and globally, counteract hacker attacks, and create a unique environment for the development of new, innovative solutions and products in the detection of fraud, cyber threats and business process monitoring.

What does the recruitment process look like?

1. CV analysis

2. Meeting with the Recruiter

3. Meeting with the Manager

4. Welcome to T-Mobile :)

  • Practical knowledge and experience in the field of IT for enterprises such as networks, server infrastructure, operating systems, web applications, APIs, databases and containerization, cloud technologies < /li>
  • Knowledge of issues related to security processes (Vulnerability & Patch management, Risk management, Incident management, etc.)
  • Experience in vulnerability detection and management tools (Tenable, Nessus, Qualys, Rapid7 , X-Ray, etc.)
  • Knowledge of Windows/Linux operating system administration issues
  • Knowledge of LAN network administration issues
  • Higher education, preferred: IT, telecommunications, cybersecurity or related
  • Knowledge of spoken and written English
  • Experience in managing projects/implementations of security systems
  • Knowledge of web application security and penetration testing is welcome
  • Certificates confirming knowledge in the field of IT security (e.g. CompTIA, CISSP, CRISC, CISM, CEH, CISA, etc.)
  • Knowledge of AGILE, SCRUM, KANBAN work methodologies
  • Experience in internal management security audits (ISO 27001)
  • Knowledge of other Security technologies (WAF, IDS/IPS, SIEM, Firewall, DLP, EDR, NAC, etc.) Maintenance, operation and development of a corporate vulnerability management system < /li>

    We offer:

    Cybersecurity is an extremely important element of work in telecommunications, because our priority is to protect our clients' data. We observe the network 24/7 and monitor anomalies, while protecting the State's Critical Infrastructure.

    We prevent and immediately respond to all threats. Every day we influence the security of millions of users of our network by providing them with services with the highest level of security.

    We approach security issues strategically and globally, counteract hacker attacks, and create a unique environment for the development of new, innovative solutions and products in the detection of fraud, cyber threats and business process monitoring.

    What does the recruitment process look like?

    1. CV analysis

    2. Mete with the Recruiter

    3. Meeting with the Manager

    4. Welcome to T-Mobile :)

    , [Maintaining and evaluating the vulnerability scanning and detection architecture, Identification and assessment of vulnerabilities in the enterprise infrastructure, Vulnerability lifecycle management, from detection to assessment, reporting, escalation, repair and verification, Cooperation with application and infrastructure teams to advise and assist in remediating vulnerabilities within appropriate timeframes and tracking remediation activities]

    Requirements: API, Nessus, Windows, Linux, LAN , CISSP, CISM, CISA, Kanban, ISO, WAF, IPS, DLP, EDR
    Additionally: Private healthcare, Sport subscription, Free coffee, Mobile phone, Free parking, No dress code.

Translated by Google

Without experience
Warsaw
Full-time work
Want to get related jobs?
New job openings in your Telegram
Subscribe
We use cookies
accept