* Æ÷Áö¼Ç¸í: Sr Information Security Specialist (°ú/Â÷Àå±Þ)
(°³ÀÎÁ¤º¸º¸¾ÈÀÌ ¾Æ´Ñ ½Ã½ºÅÛ, ¾îÇø®ÄÉÀÌ¼Ç º¸¾È °æ·ÂÀÚ¸¦ ã°í ÀÖÀ½)
* ä¿ëÇüÅÂ: Á¤±ÔÁ÷
* ¸®Æ÷Æ®¶óÀÎ : ±Û·Î¹ú ÀÓ¿ø (¸»·¹ÀÌÁö¾Æ, ¹Ì±¹)
* ´ã´ç¾÷¹«
-Responsible for managing the end-to-end vulnerability management lifecycle, including the identification,
assessment, and remediation of security weaknesses across the infrastructure and applications
- Plan, design, and lead the implementation of new security systems and solutions, managing them as structured
projects from initiation to completion.
-Manage and operate key security systems and tools, ensuring their optimal performance and availability for daily
security operations.
-Lead incident response activities by investigating security events, analyzing threats, and implementing corrective
actions to protect the organization's digital assets.
-Collaborate with IT and other cross-functional teams to proactively improve the overall security posture and
integrate security best practices into daily operations.
* Áö¿øÀÚ°Ý
-Minimum 7 years of Information security in domestic and global ( 6³âÀÌ»ó- 15³â ÀÌÇÏ)
-Fluent English in Written / Verbal (¸®Æ÷Æ®¶óÀÎ ¸»·¹ÀÌÁö¾Æ, ¹Ì±¹ º»»ç¿©¼ ¿µ¾î Ä¿¹Â´ÏÄÉÀ̼ÇÀÌ ´É¼÷ÀÚ ¿øÇÔ)
-Excellent written and oral communication skills
-Ability to work independently and handle multiple project
* ȸ»ç¼Ò°³
- ¹Ì±¹°è ¼ÒºñÀç, ÄÚ½º¸Þƽ, °Ç°±â´É½Äǰ ȸ»ç
- ÀÓÁ÷¿ø 500¸í ³»¿Ü, 2024³â ±âÁØ ¸ÅÃâ¾× 1Á¶4õ¾ï¿ø
- À§Ä¡: »ï¼ºµ¿ ¾Æ¼ÀŸ¿ö 27 - 29Ãþ
- ±âº»¿¬ºÀ, °íÁ¤»ó¿©±Ý, Àμ¾Æ¼ºê, »ç³»ÆÇ¸ÅÁ¦µµ ¹× ´Ù¾çÇÑ º£³×ÇÍ Á¦°ø
* Áö¿ø À̷¼ º¸³»½Ç°÷ & »ó¼¼¹®ÀÇ
- Æ÷Ä¿½º¿¡ÀÌÄ¡¾Ë, À±Á¤¼÷ (***-****-****, ******@*******.***)