* Æ÷Áö¼Ç¸í:  Sr Information Security Specialist  (°ú/Â÷Àå±Þ) 
 (°³ÀÎÁ¤º¸º¸¾ÈÀÌ ¾Æ´Ñ ½Ã½ºÅÛ, ¾îÇø®ÄÉÀÌ¼Ç º¸¾È °æ·ÂÀÚ¸¦ ã°í ÀÖÀ½)

* ä¿ëÇüÅÂ: Á¤±ÔÁ÷
* ¸®Æ÷Æ®¶óÀÎ : ±Û·Î¹ú ÀÓ¿ø (¸»·¹ÀÌÁö¾Æ, ¹Ì±¹)
 
* ´ã´ç¾÷¹« 
-Responsible for managing the end-to-end vulnerability management lifecycle, including the identification,

assessment, and remediation of security weaknesses across the infrastructure and applications
- Plan, design, and lead the implementation of new security systems and solutions, managing them as structured

projects from initiation to completion.
-Manage and operate key security systems and tools, ensuring their optimal performance and availability for daily 

security operations.
-Lead incident response activities by investigating security events, analyzing threats, and implementing corrective 

actions to protect the organization's digital assets.
-Collaborate with IT and other cross-functional teams to proactively improve the overall security posture and 

integrate security best practices into daily operations.


* Áö¿øÀÚ°Ý 
-Minimum 7 years of Information security in domestic and global ( 6³âÀÌ»ó- 15³â ÀÌÇÏ)
-Fluent English in Written / Verbal  (¸®Æ÷Æ®¶óÀÎ ¸»·¹ÀÌÁö¾Æ, ¹Ì±¹ º»»ç¿©¼­ ¿µ¾î Ä¿¹Â´ÏÄÉÀ̼ÇÀÌ ´É¼÷ÀÚ ¿øÇÔ) 
-Excellent written and oral communication skills
-Ability to work independently and handle multiple project
 
* ȸ»ç¼Ò°³ 
- ¹Ì±¹°è ¼ÒºñÀç, ÄÚ½º¸Þƽ, °Ç°­±â´É½Äǰ ȸ»ç 
- ÀÓÁ÷¿ø 500¸í ³»¿Ü, 2024³â ±âÁØ ¸ÅÃâ¾× 1Á¶4õ¾ï¿ø 
- À§Ä¡: »ï¼ºµ¿ ¾Æ¼ÀŸ¿ö 27 - 29Ãþ 
- ±âº»¿¬ºÀ, °íÁ¤»ó¿©±Ý, Àμ¾Æ¼ºê, »ç³»ÆÇ¸ÅÁ¦µµ ¹× ´Ù¾çÇÑ º£³×ÇÍ Á¦°ø 

* Áö¿ø À̷¼­ º¸³»½Ç°÷ &  »ó¼¼¹®ÀÇ 
-  Æ÷Ä¿½º¿¡ÀÌÄ¡¾Ë, À±Á¤¼÷ (***-****-**********@*******.***)