Oferty pracy
Filtry
ITGRC Analyst
LHH Recruitment Solutions
⚲ Warszawa
Nasze wymagania: Bachelor’s degree in Information Systems, Computer Science, or equivalent professional experience. 3+ years of relevant experience in Information Security, IT Risk Management, IT Compliance, or a related technology field. Knowledge of IT external standards such as SOX. Preferred certifications - CISA Experience with GRC platforms (preferred). Strong written and verbal communication skills with the ability to lead difficult conversations and influence stakeholders. Effective interpersonal and group communication skills, including negotiation, influencing, presentations, motivation, change management, and training capabilities. Demonstrated consulting skills with experience coaching and mentoring others. Zakres obowiązków: Execute IT risk management and compliance activities across the organization. Develop and maintain risk criteria; identify, analyze, and evaluate information security risks. Conduct IT risk assessments to identify risks across information systems, infrastructure, and cloud environments. Perform ongoing risk assessments and support the development and execution of a dynamic risk assurance plan focused on high‑risk areas (internal and external). Facilitate and coordinate internal and external control testing activities, including SOX-related efforts. Collaborate with IT stakeholders to oversee IT General Controls and drive improvements to meet SOX audit requirements. Review evidence of control effectiveness to evaluate the quality and performance of implemented controls. Assist management in addressing complex audit issues with internal and external auditors. Support the full policy lifecycle, ensuring IT and security policies are regularly reviewed and updated. Participate in SDLC or project lifecycle stages to ensure the effective implementation of security controls. Assess vendor information security risk profiles using questionnaires, organizational policies, industry standards, and best practices. Promote cybersecurity awareness through internal communication channels to strengthen the organization’s security culture. Collaborate with cross‑functional teams to embed security awareness into business functions and ongoing projects.
Cybersecurity Expert (Encryption & Key Management)
HIBERUS POLAND SPÓŁKA Z OGRANICZONĄ ODPOWIEDZIALNOŚCIĄ
⚲ Wrocław
32 000 - 40 000 zł netto (+ VAT)
Wymagania
- Encryption & Key Management
O firmie: - Jesteśmy częścią hiberus - jednej z wiodących firm technologicznych w Hiszpanii z obecnością w ponad 14 krajach, zatrudniającej ponad 3 000 specjalistów i obsługującej Klientów na całym świecie. - Jesteśmy profesjonalistami, którzy posiadają wiele lat doświadczenia w takich obszarach jak: IT, BI, zarządzanie projektami i przedsiębiorstwami. Cechuje nas wysoka jakość i efektywność realizowanych projektów poprzez właściwe dopasowanie kandydata do profilu poszukiwanego stanowiska i kultury organizacyjnej panującej w firmie. Obecnie współpracujemy z prestiżowymi instytucjami w obszarach bankowości, finansów, ubezpieczeń, farmacji, ochrony zdrowia i turystyki, zarówno w Polsce, jak i za granicą. - Partnerstwo, rzetelność i transparentność – to wartości, którymi kierujemy się we wszystkich naszych działaniach. Zakres obowiązków: - Analiza, tworzenie i aktualizacja polityk oraz procedur w obszarze szyfrowania i zarządzania kluczami kryptograficznymi - Ocena obecnego i docelowego stanu kryptografii w organizacji (również w kontekście Post-Quantum Cryptography) - Definiowanie i dokumentowanie kontroli kryptograficznych wspierających polityki bezpieczeństwa - Prowadzenie inwentaryzacji kluczy kryptograficznych oraz oceny ryzyka - Współpraca z zespołami bezpieczeństwa, IT oraz audytu/regulatorami
Cybersecurity Control Design Manager
Mindbox Sp. z o.o.
⚲ Kraków
25 200 - 29 400 PLN (B2B)
Wymagania
- GRC
- Cybersecurity
- NIST
- CIS
- Stakeholder management
O projekcie: At Mindbox we connect top IT talents with technology projects for leading enterprises across Europe. Join Our Team as a Cybersecurity Controls Design Manager! Are you passionate about shaping a robust cybersecurity control environment and ensuring compliance with industry standards? We are looking for a Cybersecurity Controls Design Manager to lead the design, maintenance, and continuous improvement of our cybersecurity controls framework. Sounds like your kind of challenge? #Li-Hybrid - 6 days per month on-site in Cracow What you get in return - Flexible cooperation model – choose the form that suits you best (B2B, employment contract, etc.) - Hybrid work setup – remote days available depending on the client’s arrangements - Collaborative team culture – work alongside experienced professionals eager to share knowledge - Continuous development – access to training platforms and growth opportunities - Comprehensive benefits – including Interpolska Health Care, Multisport card, Warta Insurance, and more - High quality equipment – laptop and essential software provided Wymagania: - Experience & Expertise: - Strong background in Risk and Controls Management, including control design, implementation, and assessment. - Subject matter expertise in Control Management and familiarity with GRC tools (e.g., Helios). - Technical Knowledge: - Generalist knowledge of Cybersecurity (specialist expertise is a plus). - Familiarity with NIST 800-53 and CIS measures and metrics. - Understanding of KCIs, KRIs, and KPIs in risk and control management. - Skills: - Excellent technical writing skills and proficiency in written English for high-quality documentation. - Ability to translate complex IT concepts into business-friendly language. - Strong stakeholder management and communication skills; influential and credible. - Certifications: - Recognized cybersecurity certifications are an advantage. Joining this project you’ll become part of Mindbox – a tech-driven company where consulting, engineering, and talent meet to build meaningful digital solutions. We’ll back you up every step of the way, accelerate your development, and ensure your skills make a difference. Codzienne zadania: - Ensure Cybersecurity-owned controls in the Risk and Controls Library are designed according to organizational requirements and industry standards (e.g., NIST 800-53). - Define and maintain control measurements aligned with the KCI Design Framework and CIS best practices. - Ensure controls comply with legal, regulatory, and mandatory requirements. - Prepare and present control governance reports feeding into Cyber and Tech RCMM. - Design, manage, and maintain Policies, Procedures, and Standards for Cybersecurity controls across Engineering, Operations, and Security Assessment. - Work closely with Control Owners and other stakeholders to ensure effective control implementation and reporting. - Proactively manage issues and actions, including senior stakeholder engagement. - Continuously assess and improve operational processes to enhance control effectiveness. - Provide expertise on Helios-related issues and actions.
Senior Application Security Engineer
Luxoft DXC
Wymagania
- Python
- Java
- AWS
- Azure
- SageMaker
One of the world's largest providers of products and services to the energy industry has a need to develop, support and integrate software system in Oil & Gas domain. You will be a member of a cross functional team. Key project stakeholders are open for innovative ideas. Project is based on SCRUM methodology. This is a great opportunity to work in an international team, apply and learn modern IT technologies Application Security with strong AI/ML security exposure Threat modeling and risk assessment for AI systems, APIs, and cloud-native applications Protection against prompt injection, adversarial ML, data poisoning, and model abuse Secure SDLC and CI/CD integration, including MLOps pipelines Hands-on experience with SAST, DAST, SCA, container scanning, and security automation Strong collaboration with development and data science teams
Data Loss Prevention Analyst
HSBC Technology Poland
⚲ Kraków
11 775 - 16 000 PLN (PERMANENT)
Wymagania
- DLP
- Organizational skills
- Management skills
- GDPR
O projekcie: Some careers shine brighter than others. If you’re looking for a career that will help you stand out, join HSBC, and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. Your career opportunity Global Cybersecurity Operations (GCO) provides a coordinated suite of “Information & Network Defence” services responsible for detecting and responding to information and cybersecurity threats to HSBC assets across the globe. This includes dedicated functions for the Monitoring of potential data loss events within the global estate as well as Information Protection Incident Management and Response. These two principal functions are supported by additional internal GCO capabilities in: Cyber Incident Monitoring & Response, Cyber Intelligence and Threat Analysis, Security Sciences and Client Engagement and Support Services. Critical to the success of GCO is its close partnership with sister Cybersecurity teams, IT Infrastructure Delivery, and Global Business and Function clients. The overall GCO mission is placed under the purview of the Group Chief Information Security Officer (CISO). What we offer - Competitive salary - Annual performance-based bonus - Additional bonuses for recognition awards - Multisport card - Private medical care - Life insurance - One-time reimbursement of home office set-up (up to 800 PLN). - Corporate parties & events - CSR initiatives - Nursery discounts - Financial support with trainings and education - Social fund - Flexible working hours - Free parking Wymagania: What you need to have to succeed in this role - Experience in monitoring and analysing DLP events on the DLP solution tools. - Hands-on experience of following detailed processes and procedures in security incident response lifecycle and its phases. - Ability to work effectively in a team with cross-cultural environments. - Strong organizational and time management skills to meet department standards of productivity. - Ability to speak, read and write in English, in addition to your local language. - Good level knowledge of GDPR requirements and other information related to legal banking regulations and standards. - Knowledge of common operating systems and platforms. - Flexible work availability to support the DLP team’s responsibilities. Codzienne zadania: - Monitor and protect HSBC Internal, Restricted, and Highly Restricted data in relation to the global DLP monitoring & quarantine tool. - Follow detailed processes and procedures in security incident response lifecycle and its phases. - Manage the response to and/or escalating DLP events with local and regional DLP staff, regional teams, and the Information Protection Response (IPR) team to assist with risk assessment and remediation processes. - Support handovers to other teams and countries at the start and end of the working shift. - Coordinate the actions of multiple business units during the response to DLP events and incidents. - Cultivate strong relationships with organisationally important global Business stakeholders whose support and knowledge are vital in delivering the remediation of DLP events and incidents. - Collaborate with the wider Cybersecurity (and IT) teams. - Support engagement in support of HSBC Global Businesses and Functions to drive a global up-lift in cyber-security and information protection awareness.
Control Manager (Cyber CSAT)
HSBC Technology Poland
⚲ Kraków
15 025 - 23 000 PLN (PERMANENT)
Wymagania
- Cloud
- Security
- risk management
- Audit (nice to have)
- Communication skills (nice to have)
- CISA (nice to have)
- CISSP (nice to have)
O projekcie: Some careers shine brighter than others. If you’re looking for a career that will help you stand out, join HSBC, and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. Your career opportunity The GCIO Chief Control Office (CCO) team plays an important role in enabling the bank to operate within its risk appetite by ensuring efficient and effective risk and control management. We do this by providing operational risk and control expertise, specialist technical knowledge and a deep understanding of the businesses and functions we serve. Key activities include implementation and oversight of the Group’s Risk Management Framework, ongoing and targeted controls assessments, implementing and maintaining robust risk governance, and championing a proactive risk culture. GCIO CCO works closely with partners across all lines of defence and is responsible for maintaining positive relationships with our regulators and external partners. The role is part of a global team and will be expected to support and collaborate with other team members across multiple regions, as well as manage their portfolio in maintaining an acceptable risk profile. What we offer The pay range for this role is 15.025 PLN- 23.000 PLN (monthly, gross). Variable pay is discretionary, but influenced by Group performance, business/function performance and individual performance. We offer a comprehensive and competitive package of benefits covering healthcare, family friendly leaves, pension and life assurance, as well as many other benefits to support your wellbeing. - Additional bonuses for recognition awards - Multisport card - Private medical care - Life insurance - One-time reimbursement of home office set-up (up to 800 PLN). - Cafeteria platform - Employee assistance program - Additional contributions to PPK scheme - Corporate parties & events - CSR initiatives - Nursery discounts - Financial support with trainings and education - Social fund - Flexible working hours - Free parking If your CV meets our criteria, you should expect the following steps in the recruitment process: - Online behavioural test - Telephone screen - Interview with the hiring manager Wymagania: What you need to have to succeed in this role - At least 3 years of hands-on experience with one or more or the control capabilities in the domain (Scanning, Cloud, Threat Modelling, Offensive Security, Assessment/ Vulnerability Management) either directly or as a 1/2/3LOD control management function - At least 3 years of hands-on experience and subject matter expertise in management of operational risk, non-financial risk and/or technology and information security risk. - Experience across IT, Operations, Risk Management, and / or Audit roles requiring management of diverse risk types is desirable. - Previous experience of identifying, defining and solving problems that have impact on your work or the wider business. - Financial Services or other highly regulated industry experience/exposure is preferred. - Strong communication skills to influence and challenge stakeholders. - Ability to work independently with limited supervision and to present complex issues concisely to senior partners using non-technical language. - Active industry recognized certificates will be an asset, e.g. CISA, CISSP, CRISC, CCSP etc Codzienne zadania: - Partnering with the CISO CCO to oversee the risk and control portfolio related to the services Cybersecurity Assessment & Testing (CSAT) provides to the Group. CSAT covers Vulnerability Identification, Assessment and resolution oversight, as well as coverage of Cloud and Third-Party Management. The controls consist of Scanning, Threat Modelling, Offensive Security, Assessment Prioritisation & Resolution oversight. - You will be a leader within the GCIO Chief Control Office (GCIO CCO) Function that directly supports the Group CISO within HSBC. - Act as trusted advisor for senior management by partnering to manage their operational risk i.e., risk assessments, control environment, issues management. - Promote accountable risk and control decision-making based on quality data and analysis, actively challenging poor, inefficient or excessive controls, related tasks and behaviours. - Provide specialist risk and control knowledge and insights, leading efforts to continuously improve the control environment and monitoring of risk, including behaviours - Advise and design process and controls in a commercially viable, practical and effective manner. Identify trends to anticipate future developments in the risk and control environment. - Influence and shape the development and implementation of future-fit risk management and regulatory frameworks. - Provide Senior Management with updates on any relevant changes to policy or projects related to operational risk that have an impact on their area of responsibility.
Solutions Engineering Manager, EMEA
Verkada
⚲ London
Wymagania
- IT infrastructure
- network
- security
Who We Are Verkada is transforming how organizations protect their people and places with an integrated, AI-powered platform. A leader in cloud physical security, Verkada helps organizations strengthen safety and efficiency through one connected software platform that includes solutions for video security, access control, air quality sensors, alarms, intercoms, and visitor management. Over 30,000 organizations worldwide, including more than 100 companies in the Fortune 500, trust Verkada as their physical security layer for easier management, intelligent control, and scalable deployments. Founded in 2016, Verkada has expanded rapidly with 15 offices and 2,200+ full-time employees. About The Role The Solutions Engineering team is looking for an additional SE leader to join our EMEA HQ team based in London, UK. The SE manager is responsible for leading and developing a high-performing MM Solution Engineering team across Europe. The candidate should be a proven technical leader in a fast-paced environment who is highly motivated, entrepreneurial, with excellent follow-up and follow-through. This role requires that you be on-site at our EMEA HQ in London,UK, 5 days a week. What You'll Do - People Leader: Hire, develop, and lead an inclusive, engaged, and high-performing Select & Territory Solution Engineering teams - Technical Leader: Technical coach, mentor, and problem solver, helping with technical escalations and navigating complex technical solutions - Builder: Identify gaps, show initiative, and take ownership to build out programs and processes in support of the SE team - Connector: Work cross-functionally to drive improvements and increase communication and collaboration across departments, e.g. sales, product, support, enablement, marketing, etc - Career Champion: Develop and grow the team’s skillset through coaching, mentoring, and enablement - Travel Requirement: Up to 25%
Solutions Engineer
Verkada
⚲ London
Wymagania
- Python
- TCP/IP
- TLS
- DNS
- APIs
Who We Are Verkada is transforming how organizations protect their people and places with an integrated, AI-powered platform. A leader in cloud physical security, Verkada helps organizations strengthen safety and efficiency through one connected software platform that includes solutions for video security, access control, air quality sensors, alarms, intercoms, and visitor management. Over 30,000 organizations worldwide, including more than 100 companies in the Fortune 500, trust Verkada as their physical security layer for easier management, intelligent control, and scalable deployments. Founded in 2016, Verkada has expanded rapidly with 15 offices and 2,200+ full-time employees. About the Role Verkada is seeking Solutions Engineers to own and enhance the customer experience, from the proof-of-concept to the final decision. This technical individual will provide pre-sales engineering support to our sales team, be a trusted advisor to our customers/partners, and play a critical role in designing technical solutions. We are looking for individuals who can match our fast paced environment and learn quickly! You will join a team of highly motivated SEs delivering impactful results for the company using the latest cutting edge technology. What You'll Do - Be the trusted technical advisor to key customer stakeholders: CTOs, CISOs, IT Executives, Security Engineers, Network Engineers, Head of Physical Security, etc - Utilise your technical expertise to understand and navigate customer requirements - Collaborate with the Sales team to assess and qualify customer opportunities, and contribute to the design of effective technical solutions - Lead product demonstrations and deliver engaging presentations tailored to both technical and non-technical audiences - Act as the Verkada technical Subject Matter Expert, collaborating closely with other departments such as Product, Support, Marketing, and Enablement
Senior Solutions Architect - Automation
Bayer
⚲ Warsaw
19 500 - 26 850 PLN (PERMANENT)
Wymagania
- Azure
- powershell
- Azure Automate
- ServiceNow (nice to have)
O projekcie: For Digital Hub Warsaw, we are looking for: Senior Solutions Architect - Automation Wymagania: Key Responsibilities: Operate, further develop, and manage the Workplace Automation environment, which currently consists of Microsoft System Center Orchestrator and all its integrations. This includes designing and maintaining process flows, as well as ensuring effective cross-collaboration with key stakeholders and teams. Codzienne zadania: - Proficiency in designing, deploying, and managing Microsoft SCO and Workplace Automation like Azure Automate, including experience creating and maintaining automation runbooks and workflows. - Strong knowledge in automation tooling and scripting languages such as Powershell, and ability to implement the automation scripting to streamline processes - In-depth understanding of IT infrastructure and how it can be used to benefit automation, such as ServiceNow, networking and virtualization. - Understanding of cloud platforms and services, such as Azure - Proficiency in implementation methods and monitoring and assessing automation deployments - Strong problem solving, analytical and integration skills - Ability to create comprehensive documentation for automation processes, workflows and system configurations.
Senior Software Engineer (Backend)
Abnormal
Wymagania
- Python
- gRPC
- Kafka
- Redis
- AWS S3
Senior Software Engineer (Backend) - Behavioral Security Products At Abnormal AI, we protect our customers against nefarious adversaries who are constantly evolving their techniques and tactics to outwit and undermine the traditional approaches to Security. Abnormal is recognized as a top cybersecurity startup (Leader in the 2025 Gartner Magic Quadrant for Email Security Platforms), securing a Series D funding of $250 million at a $5.1 billion valuation in August 2024. About The Team The team is responsible for the ownership, development, and operation of the infrastructure and ML models, customer facing APIs and internal tools that drive Abnormal's Account Takeover (ATO) protection product. This product is crucial for detecting malicious activity and safeguarding customers from account theft. About The Role We are looking for a Senior Software Engineer to take ownership of complex feature delivery and technical design for our ATO platform. This pivotal role involves evolving the platform to scale with expanding product requirements. The position requires a blend of hands-on backend systems development, production ownership, stakeholder management, and team mentorship. The core goal is to enhance system reliability, reduce latency, and significantly accelerate feature release cycles. What You’ll Do Technical Delivery & Excellence - Design, build, and iterate on scalable backend and ML systems, APIs, frameworks, and internal tools - Own end-to-end delivery of complex features that directly impact customer experience. - Ensure stability, reliability, and operational excellence of critical systems. - Write clean, testable, and resilient code with attention to edge cases and performance. - Write and review technical design documents and influence adoption across the team. - Participate in code and design reviews, and contribute to on-call rotations. Leadership & Collaboration - Collaborate with product managers, designers, and engineers to align on specifications and priorities. - Break down complex projects into clear executable steps and drive them to completion. - Actively contribute to roadmap discussions and propose long-term technical plans. - Communicate effectively in an async-first environment, providing clarity on updates, challenges, and solutions. - Mentor peers, share knowledge, and influence engineering practices across the team.
Senior Security Engineer – Endpoint Security (Linux)
Antal
⚲ Kraków, Warszawa
25 200 - 36 960 PLN (B2B)
Wymagania
- Linux
- EDR
- Ansible
- Python
- Bash
- Perl
- Cloud
- AWS
- Azure
- Git
- Jenkins
- Security
- Networking
- Communication skills
- XDR
O projekcie: Senior Security Engineer – Endpoint Security (Linux) - Type of contract: B2B (hourly rate, no paid days off) - Hybrid model: 6 days per month from the office (Cracow/ Warsaw) We are seeking an experienced Security Engineer to join a global Cybersecurity Engineering team, responsible for designing and implementing enterprise-grade Endpoint Security solutions across Linux environments. This role combines hands-on engineering, automation, architecture development, and cross-functional collaboration within a large-scale, distributed infrastructure. What We Offer - Participation in a global, high-impact project - Cooperation based on a B2B contract (hourly rate, no paid days off) + Benefits - Hybrid model: 2 days per week from the office in Cracow. Wymagania: Requirements - 5+ years of hands-on Linux administration experience (security-focused experience preferred) - Proven experience securing endpoints and managing antimalware/EDR solutions - Strong expertise in Ansible Automation Engine and scripting (Python, Bash, Perl, or similar) - Experience with EDR/XDR tools (e.g., CrowdStrike or similar platforms) - Exposure to cloud environments (AWS, Azure) and CI/CD tooling (Git, Jenkins) - Solid understanding of Linux security risks, vulnerabilities, and mitigation techniques - Knowledge of networking fundamentals and cloud/application security controls - Experience working in large, enterprise-scale environments - Strong analytical and problem-solving skills - Excellent communication skills and ability to collaborate cross-functionally Codzienne zadania: - Design and implement Endpoint Security solutions for Linux-based environments - Automate deployment and configuration of security controls (Ansible, scripting) - Enhance and optimize antimalware and endpoint protection capabilities - Assess current security posture, perform gap analysis, and define target architecture - Collaborate with infrastructure, cloud, and cybersecurity domain teams - Evaluate, test, and integrate security tools and technologies - Troubleshoot complex security issues across large-scale environments - Provide technical leadership and mentorship within the team
Senior Information Security Analyst
Nasdaq
⚲ Vilnius
From 3 600 EUR (UoP)
Wymagania
- SIEM
- SOAR
As a Senior Information Security Analyst, you’ll play a meaningful role in protecting Nasdaq’s global systems and data by detecting, investigating, and responding to cyber security threats in a 24/7 environment. You’ll thrive in this position if you’re analytical, thorough, and collaborative, with a global perspective and a strong passion for cyber security and technology in a fast‑paced, high‑impact environment. Key Responsibilities - Monitor, triage, and assess security alerts using XSOAR and related security platforms to identify real threats. - Investigate suspicious activity and support incident response and containment efforts across global environments. - Perform log analysis across endpoints, firewalls, cloud platforms, and other critical systems. - Identify indicators of compromise (IOCs), assess potential impact, and document findings in ticketing systems. - Document investigation steps, findings, and actions taken in the ticketing system. This position is located in Vilnius, Lithuania and offers the opportunity for a hybrid work environment at least 3 days a week in-office, subject to change, providing flexibility and accessibility for qualified candidates.
Senior Cyber Security Engineer AppSec Sp
Bayer
⚲ Warsaw
19 500 - 26 850 PLN (PERMANENT)
Wymagania
- Azure
- Security
- AWS
- DevSecOps (nice to have)
O projekcie: For Digital Hub Warsaw, we are looking for: Senior Cyber Security Engineer AppSec Specialist This role is responsible for managing, operating, and maintaining the controls that protect Bayer’s computer networks systems and data from cyberattacks. They work closely with IT teams to identify, assess and mitigate security risks, and they work with ITSM to ensure operational continuity and with cyber incident response to contain the damage from security incidents and prevent future attacks. Wymagania: Qualifications: - Solid experience in application security or secure software development (around 5 years is great, but we’re flexible) - Familiarity with OWASP Top 10 and common vulnerability types - Hands-on experience with tools like SAST, DAST, or SCA is a plus - Comfortable working in cloud environments (AWS, Azure, or GCP) - Bonus points for experience with threat modeling, DevSecOps, or secure architecture design Codzienne zadania: - Lead the implementation of secure coding practices across global development teams - Perform hands-on security assessments of web and cloud applications using cutting-edge tools - Collaborate with DevOps and engineering teams to embed security into CI/CD pipelines - Drive threat modeling sessions and proactively identify vulnerabilities before they reach production - Stay ahead of emerging AppSec trends and help shape our global security strategy
Security Engineer
Beekeeper AG
⚲ Kraków
20 960 - 28 200 PLN (B2B)
Wymagania
- Security
- AWS
- GCP
- OWASP
- Python
- Java
- Kubernetes
- CI/CD
- TCP/IP protocols
- DNS
- SAST
- DAST
- Docker (nice to have)
O projekcie: This role is responsible for the proactive engineering and technical optimization of the organisation security detection stack. You will take ownership of triaging and investigating security events from GuardDuty, Sysdig, and WAF telemetry, moving beyond dashboard monitoring to perform active troubleshooting via log analysis and direct cluster interaction (with kubectl ang gcloud). You will be expected to proactively tune detection logic to reduce false positives and develop automation scripts in Python or Bash to eliminate manual operational tasks. Additionally, you will drive the remediation of GitHub Advanced Security findings by providing developers with actionable code-level fixes and ensuring security configurations are managed as code. What we offer 📱 Phone & Home Internet costs reimbursement up to 80 PLN/month 🛡️ Private health care package with Luxmed – covered for you and partially for your partner / family 🧘♀️ Cafeteria benefits – monthly budget to cover sport cards or other purchases 💰 Creative Allowance – paid as 1000 PLN gross/month 💻 Home office set-up reimbursement up to 1000 PLN 🎉 26 days of annual leave/year and 2 Mental Health days off per year Benefits listed above are part of the compensation package for contract of employment. Who we are Beekeeper believes in the potential of every single employee. That’s why we’ve built the essential platform for frontline workers. We help organisations digitally enable their frontline, to boost productivity, quality and safety, and be more agile. Beekeeper and LumApps merged to create the first AI-powered Employee Hub, an all-in-one platform designed to connect and empower every employee - whether desk-based or frontline. LumApps, a SaaS platform dedicated to Employee Experience, helps companies drive digital transformation in communication, collaboration, and engagement with their clients, partners, and, most importantly, their employees. Together, our mission is to redefine the employee experience by integrating communication, productivity, and engagement tools into a unified, intelligent platform that serves over 7 million users globally. Wymagania: What we look for in you - 3+ years of professional experience in application / cloud security - Ability to analyze WAF traffic and cloud telemetry (e.g., GuardDuty, Sysdig) to identify attack patterns, eliminate false-positives and tune the tooling. - Hands-on experience applying and auditing/remediating security best practices in AWS/GCP, Kubernetes and containerized infrastructure - Strong understanding of application and API security principles (e.g., OWASP Top 10, OWASP API Top 10). - Practical experience with source code analysis and the ability to read and understand Python and/or Java. - Hands-on experience with security monitoring tools including SAST, DAST, and SCA + practical experience integrating them within the CI/CD pipelines. - Solid understanding of data security, encryption techniques, and secure data handling. - Working knowledge of network protocols (TCP/IP, DNS) and security concepts (WAFs, IDS). Codzienne zadania: - Security Operations & Tooling: Maintain and monitor automated DAST, SAST, and SCA setups. Triage findings and work with engineering teams to ensure timely resolution of vulnerabilities. - Incident Response: Participate in the coordination and tracking of security incidents and tickets to ensure resolution within SLAs. - SDLC Contribution: Collaborate with developers to promote secure coding practices and API security within the Software Development Lifecycle. Review third-party components for vulnerabilities using SCA tools. - Testing & Assessments: Assist in managing recurring security review processes, including internal penetration testing and risk assessments. - AI Security: Apply security best practices to the organization's usage of AI and LLM systems, supporting the broader strategy developed by senior leadership. - Knowledge Sharing: Support security awareness training and participate in internal knowledge-sharing sessions.
Sales Engineering Manager – Enterprise, Northern Europe
Abnormal
Wymagania
- cybersecurity
Sales Engineering Manager – Enterprise (Northern Europe) We’re looking for an experienced Sales Engineering Manager to lead and scale our Enterprise SE function across Northern Europe. This senior, hands-on leadership role is for someone who enjoys building high-performing teams, shaping technical sales and acting as a trusted partner to Sales and Product in complex enterprise environments. You’ll inherit a strong team and play a critical role in helping it scale as the region grows. Success in this role directly impacts enterprise win rates, deal quality, customer trust, and product direction. This is a player-coach role: you’ll spend time developing people and systems, while also stepping into strategic accounts where experience and credibility matter most. Why this role matters - Northern Europe is a strategic growth region with sophisticated buyers and complex enterprise environments - Sales Engineering is central to winning trust in high-stakes security conversations - This role influences revenue outcomes, sales efficiency, and product prioritisation - You will help define what “great” looks like for enterprise technical sales at scale What you’ll do Lead and develop the team - Manage and mentor a team of Enterprise Sales Engineers, setting a high bar for technical credibility and customer engagement - Coach individuals through regular 1:1s, deal reviews, and skills development - Recruit and onboard exceptional SE talent as the region scales Drive enterprise deal success - Own technical execution for enterprise sales cycles, ensuring consistent, high-quality customer experiences - Act as a senior escalation point and trusted advisor on complex or strategic opportunities - Partner closely with Sales leadership to improve qualification, deal strategy, and win rates Build for scale - Design and improve systems, processes, and enablement materials that help SEs ramp quickly and perform consistently - Define and track meaningful metrics around technical engagement, effectiveness, and impact Influence product direction - Act as a voice of the customer for Northern Europe, feeding real-world enterprise requirements back into Product - Help shape roadmap priorities through structured feedback from the field
Principal Solutions Engineer – Application Access Governance (AAG) - EMEA
Saviynt
Wymagania
- SAP
- GRC
- Application Security
- Identity Management
- ERP
Principal Solutions Engineer – Application Access Governance (AAG) - EMEA As a key member of the Revenue Team, the Client Solution Advisor will be responsible for leading the sales strategy and driving growth for the Application Access Governance (AAG) product line with a focus on the SAP Ecosystem. AAG is an important product within our best-in-breed Converged Identity Platform. This individual contributor role will support the assigned regional sales teams by leading sales presentations, training, and developing strategies aimed at expanding the customer base and maximising revenue. The ideal candidate will work closely with product, partners, product marketing, and sales teams to execute the go-to-market strategy, drive profitable subscription revenue growth, and contribute to the overall success of the business. Go-to-Market Strategy for AAG: - Collaborate with internal stakeholders to craft and execute the overall sales strategy for the Converged Identity Platform, but with focus on the Application Access Governance (AAG)portion of the platform, ensuring alignment with business objectives. - Take a leadership role in sales conversations/presentations and act as a trusted advisor throughout the customer lifecycle, from prospecting to post-sale, with a focus on maximizing revenue and ensuring customer success. - Identify market trends, customer needs, and competitive dynamics to adjust sales strategies and drive growth. - Engage and build relationships with Partners in the region to drive revenue growth and product adoption across EMEA. - Use social media to evangelize and increase your personal and company profile. Sales Execution and Revenue Growth: - Drive profitable subscription revenue growth in alignment with the company’s strategic goals. - Develop and implement short- and long-term partner strategies to establish a predictable and highly metric-driven revenue stream. - Understand customer underlying architecture and needs, ability to articulate the future architecture to satisfy all the current and future needs. - Support the AAG presales team members in the other regions as per the need and work as a team. Scaling & Performance Optimization: - Implement necessary adjustments to optimize sales performance in your region to achieve ARR as per the company goals. - Work with cross-functional teams to refine sales processes, tools, and resources to facilitate business expansion and revenue acceleration. - Plan and manage suitable demand generation activities and ensure strategic execution. Field Enablement & Specialist Training: - Train and enable field Sales Directors, Client Success Managers, and other customer-facing teams on the Converged Identity Platform with a focus on Application Access Governance (AAG), including key business use cases, competitive landscape, and market drivers. - Develop and deliver sales enablement content, training materials, and best practices to ensure alignment across sales teams. - Present/demo at events to audiences of all sizes. Customer Advocacy & Strategic Feedback Loop: - Serve as the voice of the customer, ensuring that product development and marketing teams are aligned with customer needs and pain points. - Collaborate closely with the product, product marketing, and sales teams to develop competitive positioning, increase market awareness, and improve product offerings. - Act as a trusted advisor to customers, providing insights and recommendations based on industry knowledge and product expertise.
Identity Security - Technical Account Manager - EMEA
Saviynt
⚲ London
From 0 GBP (UoP)
Wymagania
- IGA
- IAM
- Java
- SailPoint
Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes. Customers trust Saviynt to safeguard their digital assets, drive operational efficiency, and reduce compliance costs. Built for the AI age, Saviynt is today helping organizations safely accelerate their deployment and usage of AI. Saviynt is recognized as the leader in identity security, with solutions that protect and empower the world’s leading brands, Fortune 500 companies and government institutions. For more information, please visit www.saviynt.com. We're looking for a Technical Account Manager who is a true Identity Security Practitioner—someone who lives and breathes identity security, not just manages accounts. This isn't just about support; it's about being the technical vanguard for our most strategic clients, guiding them through complex identity transformations, anticipating their needs, and ensuring their Saviynt platform becomes an indispensable pillar of their security posture. You'll bridge the gap between deep technical expertise and strategic client partnership, driving successful implementations and ensuring long-term value. What You'll Be Doing: - Be the Identity Security Guru: Serve as the primary technical authority for assigned clients, providing high-level technical guidance and strategic direction throughout their Saviynt journey. - Architect and Define Solutions: Lead the technical definition, scoping, and design of complex identity security solutions, translating intricate client requirements into robust, scalable Saviynt deployments. This includes comprehensive RFP responses, detailed professional services estimates, project plans, Rough Order of Magnitude (ROMs), and Statements of Work (SOWs). - Own the Technical Delivery: Take full ownership of the technical execution of SOWs, orchestrating the successful delivery of professional services. This involves hands-on oversight, troubleshooting, and acting as the primary escalation point for all project-related technical challenges. - Strategic Client Engagement: Conduct regular, in-depth technical reviews with customers, proactively identifying potential issues, optimizing their Saviynt environment, and ensuring maximum platform utilization and value realization. - Proactive Problem Solving: Monitor support requests and client environments to identify recurring technical patterns, championing product enhancements or process improvements within Saviynt to address systemic issues. - Drive Expansion & Adoption: Partner with account teams to identify and cultivate up-sell, cross-sell, and expansion opportunities by demonstrating how Saviynt can solve evolving identity security challenges and improve business outcomes. - Technical Enablement: Develop and deliver advanced technical demonstrations and training sessions for clients, ensuring they can independently leverage the full power of the Saviynt platform. - Internal Collaboration: Act as a critical liaison between clients, our Customer Professional Services (CPS) team, Engineering, and Product Management, ensuring client feedback drives product innovation and technical excellence. - Operational Excellence: Assist with regional services resourcing and forecasting, and manage timesheet and invoicing approvals, ensuring seamless operational flow.
Head of Security
DeepL
⚲ London, Berlin, Munich
Wymagania
- AWS
- SIEM
- SOAR
- IAM
Meet DeepL DeepL is a global AI product and research company focused on building secure, intelligent solutions to complex business problems. Over 200,000 business customers and millions of individuals across 228 global markets today trust DeepL's Language AI platform for human-like translation, improved writing and real-time voice translation. Building on a history of innovation, quality and security, DeepL continues to expand its offerings beyond the field of Language, including DeepL Agent - an autonomous AI assistant designed to transform the way businesses and knowledge workers get work done. Founded in 1997 by CEO Jarek Kutylowski, DeepL now has over 1,000 passionate employees and is supported by world-renowned investors including Benchmark, IVP, and Index Ventures. Our goal is to become the global leader in trusted, intelligent AI technology, building products that drive better communication, foster connections, and create a meaningful impact. To achieve this, we need talented people like you to join our journey. If you’re ready to shape the future of AI and grow your career in a fast-moving, purpose-driven environment, DeepL is your next destination. What sets us apart What sets us apart is our blend of cutting-edge AI technology, meaningful work, and a culture where people truly thrive. We’re a team of innovators, researchers, and creators driven by a shared purpose to unlock human potential by making work simpler, smarter, and more connected. When we share what it’s like to work at DeepL, the reactions are overwhelmingly positive. This might be because of our technology that helps millions of people and businesses communicate and work better every day, or because of the trust, curiosity, and care that shape our culture. What we know for sure is this: being part of DeepL means joining a team dedicated to innovation, growth, and well-being. Discover more about life at DeepL onLinkedIn ,Instagram , and our Blog . Your responsibilities Strategic Ownership & Leadership Own the overall Information and IT Security strategy, leading teams responsible for infrastructure security, application security, organisational security, and information governance. Develop, implement, and maintain robust security frameworks that ensure the confidentiality, integrity, and availability of systems and data across the organization. Act as the central authority for all security-related initiatives, ensuring alignment with business goals and compliance requirements while being mindful regarding company efficiency. Governance, Risk & Compliance Own compliance programs (e.g., SOC 2, ISO 27001, BSI C5). Shape our approach to risk assessment, third-party risk management, and internal security audits. Support customer security reviews, RFPs, and due-diligence engagements. Operational Security & Technology Oversight Oversee the design, implementation, and continuous improvement of security architecture across IT infrastructure, cloud environments, user devices and SaaS systems. Ensure secure operations through proactive threat monitoring, vulnerability management, hardening, and incident response training. Collaborate with engineering teams to integrate security-by-design principles into infrastructure and product development lifecycle. Collaboration & Stakeholder Management Partner with Infrastructure, Product teams, People department, Legal, Sales, and other Business leaders to ensure that security and data protection are embedded into all company processes. Foster a strong security culture through awareness training, communication, and transparent reporting of security metrics and incidents. Represent the company in security discussions with customers, partners, auditors, and regulators and support sales and customer success teams in high-stakes enterprise deals requiring executive security leadership. Contribute to board-level reporting on security posture, risk, and investment.
Enterprise Solutions Engineer
Verkada
⚲ London
Wymagania
- Linux
- Python
- AWS
- Azure
Who We Are Verkada is transforming how organizations protect their people and places with an integrated, AI-powered platform. A leader in cloud physical security, Verkada helps organizations strengthen safety and efficiency through one connected software platform that includes solutions for video security, access control, air quality sensors, alarms, intercoms, and visitor management. Over 30,000 organizations worldwide, including more than 100 companies in the Fortune 500, trust Verkada as their physical security layer for easier management, intelligent control, and scalable deployments. Founded in 2016, Verkada has expanded rapidly with 15 offices and 2,200+ full-time employees. About the Role Verkada is seeking an Enterprise Solutions Engineer in the London Area with expert experience in Cloud Security, IoT Systems, Networking, Linux systems, Security Surveillance and Access Control. This individual will partner directly with their territory account executives to expand the Verkada footprint upmarket into key UK Accounts. Responsibilities include directly interfacing with customers/partners throughout the sales process, overcoming technical objections, assisting customers in designing deployments with Verkada Products and providing technical assistance to territory account reps. The ideal candidate will be highly motivated, able to learn quickly and work independently while making impactful results for the company. What You'll Do - Technical Leader: Be the subject matter authority on the full Verkada suite of products and offerings and articulate the value added benefits to customers throughout the sales process. - Objection Handler: Overcome objections and defuse landmines while securing the technical win for Verkada. - Evangelist: Effectively present the Verkada solution to all levels of customer, from C-level executives to loss prevention managers and directors of IT. Be a Product Technical Evangelist in training/educating partners, customers, and internal employees on the latest Verkada product offerings. - This role requires regular travel, estimated to be more than 60% of the time, including both domestic and international destinations as needed. The successful candidate must be comfortable with frequent travel to support business operations, customer and partner engagements and team collaboration.
Director, Solutions Engineer - EMEA
Saviynt
⚲ London, Amsterdam
Wymagania
- Identity Governance and Administration
- Cloud Security
- REST API
- SAML
Director, Solutions Engineer - EMEA Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes. Customers trust Saviynt to safeguard their digital assets, drive operational efficiency, and reduce compliance costs. Built for the AI age, Saviynt is today helping organizations safely accelerate their deployment and usage of AI. Saviynt is recognized as the leader in identity security, with solutions that protect and empower the world’s leading brands, Fortune 500 companies and government institutions. For more information, please visit www.saviynt.com. The Director of Solutions Engineering, EMEA is a senior leader within Saviynt’s Revenue organization, bringing together deep domain expertise in Access Governance and Cloud Security with strong commercial and strategic acumen. This role partners closely with Sales Directors and Regional Vice Presidents to drive growth across new and existing enterprise accounts by positioning and selling Saviynt’s integrated identity and cloud security platform. As a regional leader, this individual plays a pivotal role in shaping go-to-market execution and customer engagement strategy, while also serving as a key contributor to product marketing and enablement. The Director will help drive the creation of internal and external-facing content—including solution briefs, white papers, webinars, and web content—and enable teams across the organization with consistent messaging, best practices, and technical expertise. The role is responsible for building, developing, and scaling the Solutions Engineering & Strategy team across EMEA, ensuring high-quality customer engagement through workshops, collaborative strategy sessions, and detailed discovery that clearly articulates business value. Acting as a critical bridge between sales, product, and delivery, the Director ensures a seamless transition from pre-sales to implementation, while championing deployment methodologies and industry best practices for sophisticated enterprise customers. Working proactively and independently across functions, the Director of Solutions Engineering, EMEA drives opportunities to closure, influences strategic outcomes, and delivers measurable impact on regional revenue growth. This person must be located in London UK/ Netherlands / Germany and will work remotely + travel.
Compliance & Cybersecurity Specialist
Jit Team
⚲ Gdynia, Gdańsk
7 000 - 18 000 PLN brutto (ANY)
Wymagania
- Information Security
- Risk Management
- Cybersecurity
Wynagrodzenie: UoP: 7 000 – 13 000 PLN brutto/miesiąc B2B: 500 – 875 PLN netto/dzień Tryb pracy: Hybryda 2-3 dni/tydzień w biurze w Gdyni/Gdańsku Dlaczego warto wybrać tę ofertę? • Dołączysz do firmy i zespołu, która od lat działa zgodnie z normami ISO (27001, 14001, 9001), inwestuje w bezpieczeństwo i stale się rozwija • Wszystkie systemy i normy zostały wdrożone własnymi siłami – dołączysz do zespołu, który z sukcesem definiuje i wdraża kolejne procesy • Nauczysz się tu kompleksowego podejścia do bezpieczeństwa i zgodności – uczestnicząc i/lub prowadząc projekty od koncepcji po ostateczne wdrożenie. Zapoznasz się ze wszystkimi krokami, szczegółami i zależnościami • Zainwestujemy w Twój rozwój – uzyskasz możliwość ciągłego doskonalenia, opłacimy szkolenia i certyfikaty dla Ciebie • Będziesz pracować blisko z biznesem, IT, kluczowymi osobami zarządzającymi firmą a także z klientami. Twoja praca będzie bezpośrednio przekładać się na biznes i kluczowe procesy w firmie Projekt Dołączysz do wewnętrznego zespołu odpowiedzialnego za obszary compliance i cyberbezpieczeństwa w Jit Team. Twoim zadaniem będzie przede wszystkim zapewnianie zgodności procesów z normami ISO i regulacjami prawnymi (GDPR, NIS2), analizę zgodności procesów i działań firmy z wymaganiami bezpieczeństwa klientów (szczególnie z branży finansowej), budowanie świadomości w organizacji, udział w analizie ryzyka i rozwiązywaniu incydentów bezpieczeństwa. Kluczowe zadania i obowiązki • Przygotowanie organizacji do audytów certyfikatycyjnych i re-certyfikacyjnych ISO. Udział w audytach wewnętrznych i zewnętrznych • Przeprowadzanie i utrzymywanie procesu ciągłego zarządzania ryzykiem w organizacji • Realizacja bieżących działań zapewniających zgodność ze standardami ISO – wynikających z wewnętrznych procedur i procesów • Ciągłe doskonalenie i optymalizacji procesów i procedur wdrożonych w firmie • Wdrażanie i aktualizowanie polityk i standardów bezpieczeństwa • Budowanie świadomości w zakresie compliance & cybersecurity • Analiza zdarzeń i niezgodności – reakcja na incydenty Technologie z jakimi będziesz pracować • Szeroko pojęte, nowoczesne cyberbezpieczeństwo – z naciskiem na technologie cloud, AI, środowiska silnie regulowane prawnie, współpracę międzynarodową itp. • Systemy zarządzania zgodne z normami ISO 27001, 14001, 9001, 22301(i w przyszłości kolejnymi) • Narzędzia i procesy zarządzania ryzykiem • Regulacje prawne: GDPR, NIS2 i pokrewne • Wymogi klientów z silnie regulowanych branż w różnych częściach świata O Jit Team The Human factor of IT – to nie tylko slogan, to filozofia. Fundamentem Jit Team są ludzie, dlatego to właśnie Was traktujemy priorytetowo. Zatrudniamy ponad 700 doświadczonych ekspertów. Tworzymy wysoko specjalizowane zespoły dla klientów z całego świata. Członkom zespołu oferujemy rozwojowe projekty, szeroki zakres benefitów oraz autorski program rozwoju zawodowego. Za naszą maksymą stoją, także działania charytatywne i edukacyjne. Wspieramy uczniów i studentów, przekazując sprzęt do nauki. Oferujemy staże ułatwiające rozpoczęcie kariery w IT. Wspieramy ratowników wodnych oraz szpitale, dostarczając potrzebne wyposażenie. Jesteśmy Polską firmą i dzielimy się tym, co osiągnęliśmy przez 15 lat działalności. Wspierając rodzime inicjatywy, dbamy o obieg dobrej energii.
Senior Network Security Engineer (Cisco ISE)
DCG sp. z o.o.
⚲ Gdańsk, Warszawa, Gdynia
26 880 - 30 240 PLN (B2B)
Wymagania
- Cisco
- REST API
- Switches
O projekcie: Private medical care Co-financing for the sports card Constant support of dedicated consultant Employee referral program Wymagania: Deep knowledge and hands-on experience with Cisco ISE Experience working with TrustSec, RADIUS, and REST API integrations Strong understanding of 802.1X authentication, AAA, and switch-based access control Experience configuring and troubleshooting Cisco switches in enterprise environments Ability to perform scripting tasks for bulk configuration updates via REST API Experience diagnosing network issues related to MTU, SD-WAN, and authentication failures Deep knowledge and hands-on experience with Cisco Catalyst Center Codzienne zadania: - Migrating TrustSec from RADIUS-based communication to REST API in Cisco ISE - Configuring and updating Cisco switches to support TrustSec over REST API - Updating REST API credentials across Network Access Devices (NADs) in Cisco ISE - Implementing and adjusting 802.1X authentication and AAA configurations - Updating switch configurations for profiling over RADIUS and access-session mac-move - Troubleshooting issues related to AAA server availability, MTU problems, and authentication failures - Improving switch resilience and service availability in relation to the Cisco ISE platform
Security Consultant (She/He/They)
Accenture Polska
⚲ Warsaw, Krakow, Wroclaw, Lodz, Katowice, Gdansk
Wymagania
- ISO 27001
- NIST
- OWASP
- DORA
Cyber Strategy team within Accenture Security helps our Clients in secure digital transformations , through defining cyber risk management frameworks, advising in secure cloud journeys and implementing security frameworks based on best market standards. THE WORK: - Leading cyber security streams in digital transformations, including journeys to cloud, or secure-SDLC process implementations. - Conducting cyber security assessments of organizations and systems against security standards, such as ISO 27001 and NIST and recommending mitigation actions to our Clients. - Ensuring compliance with cybersecurity regulatory (DORA, NIS). - Support in implementation of BCMS systems based on ISO 22301 standard. - Support of Identity & Access Management systems implementation. - Analyzing and evaluating security controls and documentation policies (evidence). - Recommending mitigation actions related to identified risks. Flexible: The work location for this role may include a mix of working remotely, onsite at a client or in an Accenture office - depending on specific project circumstances. - With all our roles, there is some in-person time for collaboration, learning and building relationships with clients, peers, leaders, and communities. As an employer, we will be as flexible as possible to support your specific work/life needs.
Cybersecurity Product and Service Manager
United Consult Zrt.
⚲ Budapest
21 778 - 27 222 PLN (PERMANENT)
Wymagania
- Cybersecurity
- Leadership
- Product management
- Confident decision-maker
- Strong stakeholder management skills
O projekcie: Cybersecurity Product & Service Manager We are looking for a product-driven leader to take end-to-end ownership of our Cybersecurity Business Unit. This is a strategic leadership role with full accountability for product vision, portfolio performance, financial results, and organizational scalability. You will lead a multidisciplinary organization including Security Architects, Engineering, Delivery Management, and GRC — while shaping a market-leading, scalable cybersecurity portfolio. Your Responsibilities Product & Portfolio Ownership - Own and shape the full cybersecurity services and product portfolio - Define a 3–5 year product vision and strategy - Drive roadmap prioritization based on business value, margin, and scalability - Lead MVPs, innovation initiatives, and time-to-market optimization - Develop sustainable pricing and recurring revenue models Go-to-Market & Market Presence - Support presales and sales enablement - Strengthen market positioning and value proposition - Represent the company at key industry events Financial Accountability - Own revenue targets and profitability - Optimize cost structure and capacity utilization - Manage budgeting, forecasting, and margin performance in cooperation with Finance Organizational Leadership - Build a scalable, product-focused operating model - Develop and coach leaders across Delivery, Engineering, and Architecture - Foster a strong ownership and product mindset culture Why This Role Is Unique This is not a purely operational leadership role — and not a narrow product management position either. It is a true business ownership opportunity: you define the vision, shape the portfolio, build the organization, and are accountable for the financial outcome. If you are ready to lead cybersecurity as a product-driven, scalable business — we would like to talk to you. Wymagania: What are we looking for? - 8–15+ years of IT / cybersecurity experience - Proven leadership and product management or product ownership background - Strong strategic, financial, and technological understanding - Confident decision-maker with strong stakeholder management skills Codzienne zadania: - Own and shape the full cybersecurity services and product portfolio - Define a 3–5 year product vision and strategy - Drive roadmap prioritization based on business value, margin, and scalability - Lead MVPs, innovation initiatives, and time-to-market optimization - Develop sustainable pricing and recurring revenue models - Support presales and sales enablement - Strengthen market positioning and value proposition - Represent the company at key industry events - Own revenue targets and profitability - Optimize cost structure and capacity utilization - Manage budgeting, forecasting, and margin performance in cooperation with Finance - Build a scalable, product-focused operating model - Develop and coach leaders across Delivery, Engineering, and Architecture - Foster a strong ownership and product mindset culture
Splunk Threat Detection Analyst
Augmenta
⚲ Remote
13 000 - 18 000 PLN (B2B)
Wymagania
- Splunk
- SPL
- Python (nice to have)
- PowerShell (nice to have)
- Wiz (nice to have)
- Netskope (nice to have)
- Zscaler (nice to have)
O projekcie: Offer Details: - 100% Remote work, will remain remote permanently! - Working schedule: 07:00 - 15:00 CET (Central European Time) - Salary: Will be based on your experience and expertise - Technology Allowance: You will benefit from a generous budget allocated for computer, office equipment, or even a Starlink to ensure you have the tools you need to excel in your role - Healthcare: Private health insurance provided by Enel-Med (with extended family package if needed) - MultiSport: Access to various fitness and wellness facilities in Poland (with extended family package if needed) - Cooperation: Long-term! About Augmenta We are an IT consulting firm that specializes in providing digital solutions to businesses of all industries. With a team of experienced professionals and cutting-edge technology, we offer services in strategy and consulting, technology, and operations. Our goal is to help our clients stay ahead of the competition and thrive in today's digital landscape. Wymagania: The ideal candidate will be responsible for supporting the design, implementation, and maintenance of threat detection use cases within a hybrid SIEM environment. This role requires a solid foundation in security operations, log analysis, and query development to assist in protecting our organization from emerging cyber threats. Must-Haves: - 3+ years of experience in cybersecurity or information technology, with at least 1 year focused on Security Operations (SOC) or SIEM content. - Proficient in Splunk Enterprise Security (ES), including SPL (Search Processing Language) and alert configuration. - Solid understanding of network protocols, system logs (Windows/Linux), and security event analysis. - Familiarity with threat intelligence integration and applying MITRE ATT&CK framework to detection efforts. - Basic familiarity with scripting languages (e.g., Bash, Python, PowerShell) for automation and data analysis. - Familiarity with offensive security tactics & techniques is a plus. - Relevant certifications such as Splunk Core Certified Power User, CompTIA CySA+, BTL1, or similar are preferred. - Strong problem-solving skills and the ability to work collaboratively in a fast-paced environment. Nice-to-Haves: - Exposure to additional SIEM platforms or security tools (e.g., Elastic, QRadar, CrowdStrike). - Ability to learn quickly and contribute to a collaborative security culture. Codzienne zadania: - Assist in developing, optimizing, and managing SIEM searches and alerts to identify potential security threats in real-time. - Support the creation and refinement of custom SIEM use cases and detection logic to enhance threat visibility across systems and networks. - Analyze log data and triage alerts to identify anomalies and support proactive threat hunting initiatives. - Collaborate with senior engineers and incident response teams to validate detection logic and provide analysis during security incidents. - Assist in maintaining and tuning SIEM deployments, specifically focusing on false positive reduction and data quality. - Help integrate SIEM with other security tools and data sources to ensure proper data ingestion and coverage. - Stay current on evolving cyber threats, attack techniques, and industry best practices to contribute to improved detection strategies. - Document detection rules, runbooks, and incident findings for knowledge sharing and compliance purposes.
Specjalistka / Specjalista ds. bezpieczeństwa IT
ITHOUSE SPÓŁKA Z OGRANICZONĄ ODPOWIEDZIALNOŚCIĄ
⚲ Warszawa
120 - 120 zł netto (+ VAT)
Wymagania
- BCM
- BIA
- CISSP
- Certyfikat CISSP;
O firmie: - Cześć, miło nam, że tu jesteś! 👋 - Jesteśmy ITHOUSE i od ponad 7 lat łączymy specjalistów IT z projektami, które naprawdę mają znaczenie i zmieniają sposób, w jaki Polacy korzystają z technologii na co dzień. - To nie jest utarty zwrot! Współpracujemy z instytucjami publicznymi i firmami komercyjnymi, pomagając modernizować systemy, z których korzystają miliony osób. Dzięki zespołom, które budujemy, coraz mniej spraw wymaga biegania z kwitkami po urzędach, a procesy stają się prostsze, szybsze i bardziej dostępne. Ale to nie wszystko! Realizujemy też ambitne projekty R&D, m.in. dla Samsunga, gdzie technologia spotyka się ze sztuczną inteligencją i innowacją. - Staramy się dopasować projekt do osoby: do doświadczenia,preferencji i tego, co naprawdę je motywuje. Jeśli czujesz, że chcesz robić sensowne rzeczy i mieć realny wpływ, jest spora szansa, że to może być to! - W naszym procesie stawiamy na partnerskie relacje, transparentność i wzajemny szacunek. Rekrutacja to dla nas nie tylko proces, to rozmowa o tym, co dla Ciebie ważne i gdzie możesz się rozwinąć. Zakres obowiązków: - Wdrażanie i utrzymywanie standardów bezpieczeństwa zgodnych z ISO27001 oraz ISO22301, w tym klasyfikacja informacji, inwentaryzacja aktywów, analizy RTO/RPO - Znajomość i doświadczenie w tworzeniu planów zarządzania ciągłością świadczenia usług (BCM), w tym wykonywanie analiz wpływu (BIA); - Przeprowadzanie analiz bezpieczeństwa organizacji, procesów, architektury i infrastruktury IT oraz rekomendowanie działań naprawczych; - Analiza zagrożeń w sieciach komputerowych, systemach operacyjnych, aplikacjach oraz środowiskach chmurowych; - Przygotowywanie raportów, analiz oraz dokumentacji technicznej dotyczącej bezpieczeństwa IT; - Współpraca z klientami i zespołami projektowymi przy precyzowaniu wymagań oraz wdrażaniu rozwiązań zwiększających poziom bezpieczeństwa. Oferujemy: - Stabilne zatrudnienie na podstawie umowy B2B; - Wynagrodzenie w wysokości 120 zł/h netto + VAT; - Pracę w modelu hybrydowym (Warszawa).
Network Specialist Citrix
B2Bnetwork
⚲ Warszawa
130 - 180 PLN/h netto (B2B)
Wymagania
- citrix netscaler
- SNIP (Subnet IP)
We are looking for an experienced Network Security Engineer to support a strategic Zero Trust initiative focused on micro-segmentation within a large enterprise environment. The project aims to enhance network security posture by separating services currently operating on shared Subnet IPs (SNIPs) into dedicated SNIPs on Citrix NetScaler load balancers. This transformation will enable improved end-to-end connection logging, stronger traffic visibility, and alignment with internal security and incident response standards. Scope of Responsibilities • Analyze existing Citrix NetScaler configurations and identify services using shared SNIPs • Design and implement a dedicated SNIP architecture aligned with Zero Trust principles • Plan and manage subnet allocation and IP addressing for new SNIPs • Configure and modify NetScaler (Citrix ADC) settings in production environments • Migrate services from shared to dedicated SNIPs with minimal business impact • Implement and validate end-to-end (E2E) connection logging on load balancers • Troubleshoot network segmentation and load balancing issues • Produce technical documentation covering architecture, configuration, and migration procedures • Collaborate with security and incident response teams to ensure compliance with internal standards Required Profile • Strong hands-on experience with Citrix NetScaler (Citrix ADC) • Advanced understanding of SNIP (Subnet IP) management and IP addressing • Solid experience with L4/L7 load balancing configuration • Good understanding of Zero Trust principles and network micro-segmentation • Experience working in enterprise / regulated environments • Ability to independently design and execute infrastructure changes Nice to Have • Experience with SIEM integration and advanced logging solutions • Knowledge of firewall policies and east-west traffic control • Experience in security-driven transformation projects • Familiarity with automation tools (e.g., Ansible, Terraform) • Understanding of CSIRT processes and incident response frameworks
Mid / Senior IAM Engineer (Keycloak, Vault, Automatyzacja)
1dea
⚲ Warszawa, Kraków, Wrocław, Gdańsk
31 920 - 40 320 PLN (B2B)
Wymagania
- IAM
- Keycloak
- VM
- K8s
- GCP
- OIDC
- OAuth2
- SAML
- Kerberos
- LDAP
- Vault
- Terraform
- Helm
- ArgoCD
- PKI (nice to have)
O projekcie: Poszukujemy doświadczonego Inżyniera IAM, który dołączy do naszego zespołu i pomoże nam wdrażać, utrzymywać oraz optymalizować kluczowe rozwiązania w środowisku hybrydowym (on-prem i chmura publiczna). Warunki zaangażowania: Branża projektu: Consulting / IT Security (projekt dla niemieckiego Klienta)Liczba wakatów: 3Lokalizacja: 100% zdalnieStart: ASAP (akceptujemy kandydatury z max 3msc okresem wypowiedzenia)Zaangażowanie: B2B (outsourcing z 1dea), full-time, długofalowoStawka B2B (ustalana indywidualnie): 190 - 240 PLN netto + VAT / h Oferujemy - Zatrudnienie na podstawie umowy B2B (Klient nastawia się tylko i wyłącznie na długofalową współpracę, 12msc+, Umowa od razu podpisywana jest na czas nieokreślony / bezterminowo) - Możliwość pracy w 100% zdalnej - Dołączysz do firmy z solidną pozycją na rynku - Firma zapewnia nowoczesny sprzęt, oprogramowanie i konfigurację - Możliwość pracy w elastycznych godzinach (strefa czasowa EU, start pracy w zakresie 7:00 - 10:00) - Profesjonalne doradztwo i wsparcie w rozwoju kariery od doświadczonego zespołu specjalistów 1dea - Cenimy sobie koleżeńskość, otwartość, szacunek, wzajemną pomoc i wsparcie w rozwijaniu kompetencji zarówno własnych, jak i kolegów i koleżanek z zespołu - Wspieramy kulturę kreatywności. Każdy członek zespołu ma możliwość proponowania własnych pomysłów i rozwiązań, a jego głos jest zawsze brany pod uwagę Wymagania: - Minimum 4 lata komercyjnego doświadczenia w podobnej roli - Keycloak (wdrożenie na VM, K8s, GCP) - Biegła znajomość protokołów: OIDC, OAuth2, SAML, Kerberos, LDAP - Praktyczne doświadczenie z Vault (sekrety/PKI) - Automatyzacja za pomocą Terraform, Helm, ArgoCD - Doświadczenie w rozwiązywaniu problemów hybrydowych przepływów IAM - Kluczowy angielski na poziomie swobodnej komunikacji w mowie i piśmie (B2+) Mile widziane: - Znajomość podstawowych strategii federacyjnych - Doświadczenie w pracy z GCP lub K8s - Wiedza o PKI Codzienne zadania: - Wdrażanie i obsługa platformy Keycloak (on-prem/chmura hybrydowa) - Integracja Keycloak z systemami zarządzania sekretami, w szczególności Vault. - Projektowanie i implementacja protokołów auth/authz i strategii federacji. - Automatyzacja infrastruktury IAM przy użyciu narzędzi Terraform/Helm/ArgoCD. - Diagnostyka i rozwiązywanie złożonych problemów (troubleshooting) w hybrydowych środowiskach produkcyjnych.
Head of Cloud Device Protection
HSBC Technology Poland
⚲ Kraków
23 300 - 34 500 PLN (PERMANENT)
Wymagania
- Stakeholder management
- Security
O projekcie: Some careers shine brighter than others. If you’re looking for a career that will help you stand out, join HSBC, and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. Your career opportunity The Head of Cloud Device Protection is responsible for developing and leading policy and strategies to protect device and processes hosted in “Cloud” ecosystems (Cattle, Containers and Serverless etc) and that they are working in line with HSBC Cloud strategies. They are responsible for ensuring that the right processes and escalations are in place and consistent across the different Cloud environments to ensure effective operation of capabilities. What we offer: - Competitive salary - Annual performance-based bonus - Additional bonuses for recognition awards - Multisport card - Private medical care - Life insurance - One-time reimbursement of home office set-up (up to 800 PLN). - Corporate parties & events - CSR initiatives - Nursery discounts - Financial support with trainings and education - Social fund - Flexible working hours - Free parking Wymagania: The role holder will / is expected to - A background in information systems, technology, architecture, design, and service delivery of defense-in-depth capabilities. - Strong stakeholder management skills, with experience of understanding and meeting the needs of multiple stakeholders. - An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative and actionable manner. - Likely from a technology or engineering background with developed understanding of Technology Delivery Lifecycle, engineering practices, underlying infrastructure, tooling and architecture & design principles - Deep SME knowledge of containers - Experience working in a highly regulated, large multi-national environment. - Ability to understand the potential business impact of security decisions and align initiatives with business needs. - Strong inter-personal skills to work effectively with other areas inside and outside of cyber. Codzienne zadania: - Managing relationships with key stakeholders with in the relevant Cloud Service Provider Teams within HSBC. - Reviewing Coverage and Compliance across the Cloud Environments and Escalating as required. - Collaborating with other Cloud related Security teams like Security Operations, Incident Management and Cloud Security to ensure joined up decisions are made. - Tracking and oversight to completion for formal risk tickets. - Respond to queries from Audits and regulators on the protections in place and their effectiveness. - Analyse available data related to issue (which could include native logs or captured telemetry to assist in driving issue remediations
Team Leader for Penetration Test Coordination Team
Link Group
⚲ Kraków
22 000 - 23 000 PLN (B2B)
Wymagania
- Cybersecurity
- Project management
- Service Delivery
- Communication skills
- Problem-Solving
O projekcie: We are looking for an experienced leader to steer the team responsible for the global coordination of penetration testing within a top-tier international financial institution. This is not a "hands-on" technical pentester role. Instead, we need an expert who bridges the gap between deep IT security understanding and exceptional Service Delivery and people management. Your mission is to ensure that hundreds of scheduled security assessments (App, API, Infra, Mobile) are executed on time, meeting the highest quality standards and strict regulatory requirements. Wymagania: - Experience: At least 8–10 years of professional experience, with a strong focus on Project Management or Service Delivery. - Expertise: Solid background in cybersecurity practices (ideally within pentesting or security coordination workflows). - Leadership: Proven track record of managing teams within large, complex, international organizations. - Communication: Excellent written and verbal English skills (min. B2/C1) for effective collaboration across multiple time zones. - Mindset: A problem-solver who can facilitate high-stakes meetings and implement standardized processes on an international scale. - Education: Bachelor’s degree in Computer Science, Cybersecurity, or a related field (or equivalent experience). Codzienne zadania: - Team Leadership: Directly lead the coordination team across the EMEA region, fostering a culture of excellence and accountability. - Operational Oversight: Manage and track the annual Book of Work, ensuring all planned security assessments are executed according to the roadmap. - Global Collaboration: Work daily with technical Ethical Hacking units in India and other global IT departments to ensure seamless delivery and high-quality technical reviews. - Quality & Compliance: Maintain high-level reporting standards and ensure all testing activities comply with internal policies and international financial regulations. - Budget & Vendor Management: Oversee third-party cybersecurity contracts, monitor consumption, and assist in new contract negotiations to ensure optimal use of the budget. - Audit Support: Provide visibility to stakeholders by managing KPIs/KRIs and preparing necessary documentation for internal and external audits.
Senior CloudOps Engineer
RTB House
⚲ Warszawa
24 000 - 28 000 PLN netto (B2B)
Wymagania
- GitHub
- GCP
- Terraform
- Jira
- Kubernetes
- Communication
- Python
Location: Poland We Are: RTB House is a next-generation performance demand-side platform (DSP) that uses proprietary Deep Learning AI algorithms to help brands grow. The company is the market leader in driving performance using Deep Learning across the entire purchase funnel. Founded in 2012, and now operating in 90+ markets, RTB House has always been private-by-design. It embraces first-party advertising and a relentless approach to innovation. RTB House offers end-to-end Deep Learning-powered AdTech products and solutions to maximize conversion, drive new customer acquisition, create engagement, and fuel long-term demand for a global base of clients. About The Role As a Senior Cloud Operations Engineer, you will support our internal teams by managing day-to-day operations and providing technical guidance across our Google Cloud Platform (GCP) environments. You will assist internal users - from IT and engineering to business teams - by advising on project setups, configuring services, enabling integrations, supporting CI/CD workflows, and ensuring that cloud resources follow best practices in security, networking, and governance. Your role will combine operational support with small project work, helping teams onboard to GCP, troubleshoot issues, and efficiently adopt platform capabilities. You will collaborate closely with DevOps, Platform Engineering, Security, and development teams to maintain a reliable, compliant, and well-structured cloud environment. This is an excellent opportunity for an engineering professional who enjoys hands-on technical work, solving practical operational challenges, and enabling teams to use cloud services effectively. Desired Experience: • 4-6+ years of experience in Cloud Operations, or DevOps engineering, with a proven track record of managing complex, enterprise-scale environments. • Expert-level hands-on experience with Google Cloud Platform (GCP) (or other major providers), including advanced networking, organizational-level IAM, and security perimeter management (VPC Service Controls). • Deep architectural understanding of cloud services, with the ability to diagnose and resolve complex, cross-service integration issues and performance bottlenecks. • Advanced in CI/CD strategy (preferably GitHub Actions), including designing reusable workflows, implementing automated security gates, and optimizing deployment cycles for global engineering teams. • Infrastructure as Code (IaC) expertise, specifically with Terraform. Ability to build modular, scalable, and maintainable providers/modules and implement Terragrunt or similar wrappers for multi-environment orchestration. • Leadership & Mentorship: Strong ability to mentor junior/mid-level engineers and translate complex technical requirements into actionable roadmaps for stakeholders. The following skills will be crucial: • Solid knowledge of foundational Cloud concepts - including IAM, networking, VPC Service Controls, project and service configuration, and integrations - and the ability to guide users through setup, troubleshooting, and best practices. • Experience assisting teams with CI/CD pipelines, including configuration, troubleshooting, and optimization, as well as automating repetitive operational tasks to improve efficiency and reliability. • Ability to take ownership of operational tasks, diagnose and resolve issues across cloud services, and deliver clear, practical solutions even when requirements are incomplete or ambiguous. • Strong communication and coordination skills to support internal users from IT and non-IT backgrounds, collaborate with engineering, security, and platform teams, and maintain clear documentation and operational guidance. • Commitment to consistent, dependable operations through maintaining high standards of security and reliability, identifying areas for improvement, and contributing to streamlined workflows, runbooks, and service enablement. We Offer: • A unique opportunity to join an award-winning organisation, one of the fastest-growing tech companies in Europe • Ability to lead innovative and impactful projects within the organisation • Great environment for growth and skills development, work in a team of enthusiasts • Modern tech stack and access to high computational power • Remote or hybrid work model • Attractive salary Apply now! You don't need to tick every box to apply. If you are passionate about digital marketing, send us your CV, and we'll review it.
Senior CSIRT Specialist | f/m/d
ERGO Technology & Services S.A.
⚲ Warsaw, Gdansk
Wymagania
- Python
- Shell
- PowerShell
Cyber threats are constantly evolving, and we need experts to stay ahead. At ERGO Technology & Services, we’re looking for a Senior CSIRT Specialist to lead the security incident response process, support technical investigations, drive remediation, and strengthen our cyber resilience. You’ll play a key role in advancing ERGO’s security incident response maturity. If you’re passionate about protecting critical systems in a dynamic environment, we encourage you to apply. How you will get the job done - leading the overall incident response process, ensuring effective technical management and communication throughout - proposing and coordinating rapid response actions to address security threats - conducting and facilitating the incident response meetings with stakeholders and relevant teams - tracking and coordinating the tasks performed by technical responders - participating in technical investigations on an as-needed basis, primarily to support the team during high-demand periods - defining and applying containment strategies - driving remediation measures during security incidents - preparing incident reports that detail incident response activities and technical results from investigations - improving incident response playbooks and documentation - identifying necessary actions during the entire security incident management process - mentoring and supporting the development of junior team members
Security Engineer
AvaFin Poland sp. z o.o.
⚲ Warszawa
19 000 - 28 000 PLN netto (B2B) | 17 000 - 26 000 PLN brutto (UoP)
Wymagania
- AWS
- Go
- GitHub
- Terraform
- Kubernetes
- IT Security
- Python
We are looking for a mid to senior Security Engineer to join our Infrastructure & Security department. The main focus of the team is to ensure Avafin's products and teams have the least downtime possible. To accomplish this, the team is responsible for building and maintaining the IT infrastructure and workflows both on-prem and in the cloud for all teams, reliably deploy and operate our production services and products, manage services used at Avafin and ensure the organisation complies with applicable security standards and regulations. As technologies we use DefectDojo, OpenVAS, Terraform, AWS, Kubernetes, Helm, ArgoCD, Github/Gitub Actions, Microsoft365, Entra, Go, Python and more. Our IT Department, which is based in Wiener Neustadt, is part of an international Fintech company which provides short and long-term consumer loans in 5 countries within and outside of Europe. With our own platform and websites, we provide an entirely digital lending process so we can guarantee a cashflow to the consumer within only a couple of minutes. Location: Austria, Poland, Latvia, Spain, EU What we expect from you? • At least 3 years' experience working in a Security Engineering position • Experience with Vulnerability Management • Experience designing and implementing IAM, AWS IAM knowledge a bonus • Experience with Kubernetes/Helm, Terraform or similar • Hands-on expertise in Python or similar languages to implement automation for security processes and integration • Fluency in English (communication with an international team) What will you do? • Revise and improve our Identity and Access Management implementation • Ensure the secure operation of our Platform, on-prem and cloud • Contribute to the maturity of our overall Security posture • Automate diverse day-to-day tasks, service integrations and processes What we offer? • Remote work - up to 100% remote, or hybrid, if possible, up to you • Flexible working hours - only need to cover core working hours with the team • 34 hours working week - have more time for you and your hobbies at a competitive full time salary • License courses, workshops and learning opportunities within a badge system
Integration Engineer (API & Policy)
Antal
⚲ Kraków
16 800 - 30 240 PLN (B2B)
Wymagania
- REST API
- HTTP
- JSON
- Java
- Python
- Git
- GitHub Copilot (nice to have)
- API testing (nice to have)
- Postman (nice to have)
- Swagger (nice to have)
- OpenAPI (nice to have)
O projekcie: Policy Engineering Team We are looking for a 3 Policy Engineers (2x mid, 1x senior) to join a global technology initiative focused on API-driven policy design and integration. This role is suited for a technically strong, self-driven professional who is comfortable working across distributed teams and engaging directly with key stakeholders in an international environment. What We Offer - Participation in a global, high-impact project - Exposure to cross-regional collaboration and complex technical ecosystems - Opportunity to contribute to architecture-level decisions - Cooperation based on a B2B contract (hourly rate, no paid days off) + Benefits - Hybrid model: 2 days per week from the office in Cracow. Wymagania: - Strong understanding of REST API principles (HTTP methods, status codes, statelessness, versioning, error handling) - Strong knowledge of JSON format and JSON Schema validation - Rudimentary programming skills in Java or Python (ability to read, modify, and write basic scripts) - Experience working with Git-based repositories and standard development workflows - Ability to operate independently and proactively engage stakeholders - Fluent English (written and spoken) Nice to Have - Practical familiarity with GitHub Copilot and leveraging AI-assisted coding tools for scripting and automation - Experience working in enterprise-scale or regulated environments - Experience with API testing tools (e.g., Postman, Swagger/OpenAPI) Codzienne zadania: - Design, develop, and maintain policy logic within API-based architectures - Work extensively with RESTful services – integration, validation, optimization, and troubleshooting - Create, validate, and manage JSON schemas and structured data models - Develop and modify lightweight scripts to support automation and policy enforcement - Collaborate with global stakeholders across regions (working hours aligned with EU timezone) - Translate business and regulatory requirements into scalable technical solutions - Participate in code reviews and maintain engineering quality standards
Cybersecurity Resilience & Recovery Senior Analyst
Link Group
⚲ Warszawa
28 560 - 30 240 PLN (B2B)
Wymagania
- IT Resilience & Recovery
- Business Continuity & Disaster Recovery
- ISO22301
- NIST
- DORA
- NIS2
O projekcie: We are looking for a Cybersecurity Resilience & Recovery Expert to strengthen the organization’s ability to withstand and recover from IT disruptions and cybersecurity incidents. In this role, you will help define recovery strategies, assess critical IT infrastructure, and provide actionable recommendations to improve operational resilience across our IT and business services. You will work closely with the Enterprise Cybersecurity Risk team, IT operations, architecture, and business stakeholders to ensure our critical systems and applications are resilient, recoverable, and aligned with regulatory and industry standards. Wymagania: - Have hands-on experience with IT architecture, infrastructure, application recovery, or business continuity frameworks. - Understand resilience engineering, cybersecurity risk management, and disaster recovery concepts. - Are familiar with relevant standards and frameworks, e.g., NIST CSF, ISO 27001/22301, DORA, NIS2. - Can translate resilience principles into clear, actionable plans and communicate effectively with technical and non-technical stakeholders. - Are comfortable working in complex, international, matrixed environments and influencing without direct authority. - Possess strong analytical and problem-solving skills, with attention to detail. - Experience with GRC tooling, structured assessments, and reporting. - Knowledge of cloud and modern IT architectures and their resilience considerations. - Previous exposure to testing and validating recovery procedures, failover mechanisms, and backup systems Codzienne zadania: - Develop and maintain enterprise recovery strategies, baselines, and technical resilience patterns. - Identify critical IT components across applications, databases, infrastructure, and integrations. - Conduct resilience assessments against recovery baselines, including RTO/RPO alignment, backup and restore processes, failover mechanisms, and dependency mapping. - Recommend improvements to address gaps in resilience and recovery capabilities. - Collaborate across cybersecurity, IT operations, architecture, and business teams to implement resilience measures. - Support testing, validation, and continuous improvement of disaster recovery and operational resilience processes.
Cybersecurity Data Protection Analyst
Link Group
⚲ Warszawa
28 560 - 31 920 PLN (B2B)
Wymagania
- GRC
- NIST
- GDPR
- NIS2
- ISO27001
- Information Security
- Privacy Controls
- risk management
- compliance
O projekcie: We are seeking a Cybersecurity Data Protection Analyst to support and drive privacy risk management initiatives within the Enterprise Cybersecurity Risk team. This role plays a key part in ensuring that personal data processed through digital platforms, IT systems, and security technologies is handled in compliance with applicable data protection regulations and internal governance standards, while remaining aligned with broader cybersecurity risk practices. Wymagania: - Have a solid understanding of data protection, information security, and risk management principles. - Can translate business and regulatory risks into structured, actionable security or privacy controls. - Demonstrate strong stakeholder management, communication, and influencing skills. - Communicate confidently in English, both written and spoken, and can engage effectively with stakeholders at all organizational levels. - Are comfortable working in complex, international, and matrix-based environments. - Have practical experience with GRC platforms, including their configuration and use for risk and compliance activities. - Are familiar with key cybersecurity and data protection frameworks and regulations such as NIST CSF, ISO 27001, NIS2, and GDPR. Codzienne zadania: - Lead and perform Data Protection Impact Assessments (DPIAs) for both new and existing systems, including applications, cloud environments, and security tools. - Identify and evaluate privacy risks associated with personal data processing, with particular attention to high-risk activities. - Ensure DPIAs are conducted in accordance with relevant regulatory obligations and internal governance requirements. - Review and assess the adequacy of Technical and Organizational Measures (TOMs) designed to safeguard personal data. - Verify that implemented controls are risk-based, proportionate, and appropriate to the scale, context, and purpose of processing activities identified during assessments. - Provide clear recommendations and support decision-making related to risk mitigation, acceptance, or escalation in cooperation with Compliance and other stakeholders.
Cyber Defense GSOC L2 Analyst
WTW
⚲ Warszawa, Kraków, Wrocław, Poznań, Gdańsk
Wymagania
- EDR
- SoC
- SIEM
- Cyber Defence
- UEBA
Twój zakres obowiązków: • Investigate security incidents, analyze logs, and use SIEM/UEBA/EDR tools • Act as L1 escalation point, lead incident triage, containment, and root‑cause analysis • Coordinate response with technical teams, escalate critical incidents, and ensure timely resolution • Lead shift operations: task assignment, end‑of‑shift reports, and effective handovers • Improve SOC processes through documentation, alert tuning, and mentoring L1 analysts Nasze wymagania: • 4–5 years of experience in a mature SOC or cyber defence environment • Hands‑on experience with SIEM, UEBA, and EDR tools • Strong communication skills and ability to work under pressure in a 24/7 global SOC • Good knowledge of attack techniques and Linux/macOS/Windows systems • Fluent Business English; security/network certifications are a plus To oferujemy: • Flexible work model – possibility to work primarily from home • Team‑based environment with a strong culture of knowledge sharing • Growth opportunities – access to WTW’s global expertise and resources • Great working atmosphere – a supportive team and a culture built on mutual respect • Security and stability – employment under a full‑time contract in a leading international brokerage firm • Comprehensive benefits package funded by the employer, including bonus and incentive systems Benefity: • Prywatna opieka medyczna • Kafeteria benefitów & Multisport • Employee Assistance Program • Ubezpieczenie na życie • Hybrydowy model pracy • Volunteer Day • Dofinansowanie do okularów • Dofinansowanie nauki języków • Możliwości uzyskania uprawnień • Recognition HUB • Świadczenia socjalne ZFŚS • PPE
Senior SME DLP Proofpoint Analyst
Mindbox Sp. z o.o.
⚲ Kraków
29 400 - 33 600 PLN (B2B)
Wymagania
- Degree
- Security
- Cybersecurity
- risk management
- DLP
- REST API
- Stakeholder management
- Communication skills
O projekcie: At Mindbox we connect top IT talents with technology projects for leading enterprises across Europe. Join Us as a Senior Cyber Security DLP Analyst! Are you passionate about protecting critical data and ensuring compliance in a global financial environment? This is your chance to make an impact in a high-profile cybersecurity role within a leading international organization. As a Senior Cyber Security DLP Analyst, you will play a key role in safeguarding the organization’s information assets and ensuring compliance with global data security standards. You will work within the Cyber Security Technology & Engineering function, supporting critical services such as Data Loss Prevention (DLP), security infrastructure, and vulnerability management. This role is essential in protecting the brand, shareholder value, and financial assets. Sounds like your kind of challenge? What you get in return - Flexible cooperation model – choose the form that suits you best(B2B, employment contract, etc.) - Hybrid work setup – remote days available depending on the client’s arrangements (6 days per month from Cracow office) - Collaborative team culture – work alongside experienced professionals eager to share knowledge - Continuous development – access to training platforms and growth opportunities - Comprehensive benefits – including Interpolska Health Care, Multisport card, Warta Insurance, and more - High quality equipment – laptop and essential software provided Wymagania: Education & Experience: - Degree in Information Security, Cybersecurity, Computer Science, or equivalent experience. - Extensive experience in data protection, cybersecurity, and risk management within financial services. Technical Expertise: - Strong understanding of Data and Application Security fundamentals. - Hands-on experience with DLP solutions (at least two of: Symantec DLP, Proofpoint, McAfee CASB, Microsoft Information Protection). - Expertise in Data in Motion (DIM) and Data at Rest (DAR) security. - Policy creation, tuning, recertification, and deployment experience. Skills: - Strong stakeholder management and ability to lead governance meetings. - Excellent communication skills to explain complex technical issues to diverse audiences. - Analytical mindset with strong problem-solving skills. - Leadership and interpersonal skills to foster collaboration across teams. Joining this project you’ll become part of Mindbox – a tech-driven company where consulting, engineering, and talent meet to build meaningful digital solutions. We’ll back you up every step of the way, accelerate your development, and ensure your skills make a difference. Codzienne zadania: - Support the delivery of the organization’s Cyber Security strategy and operating model. - Act as a subject matter expert on DLP policies, governance, and compliance. - Drive the implementation of enterprise-wide and regional IT security strategies. - Deliver and manage tooling to enforce data security controls. - Collaborate with global and regional stakeholders, including Security Engineering, IT, and business functions. - Monitor and report on service and policy performance using agreed metrics. - Oversee technical aspects of control owner activities and ensure accurate risk assessments. - Engage with service and platform owners to address performance, technology health, and roadmap improvements. - Contribute to audits, risk assessments, and regulatory compliance initiatives.
Cloud Security Engineer
Harvey Nash Technology
⚲ Warszawa
22 000 - 28 000 PLN brutto (UoP)
Wymagania
- AWS
- IaC
- SIEM
- Cybersecurity
- Python
For our client, international technology company, we are looking for: Cloud Security Engineer, Warsaw Location: Warsaw (3 days in office per week) Employment (UoP) Salary: 22 000 – 28 000 PLN gross / month Employer: international technology company Responsibilities:• Manage and build AWS Cloud Security solutions (CSPM, ASM, DLP, SIEM and SOAR) • Develop IaC pipelines, build Terraform modules with security guardrails and create custom/open‑source security solutions • Scale security controls to new environments, including acquisitions. • Conduct security audits of Cloud environments • Apply zero‑trust principles • Participate in on‑call rotation and respond to security incidents • Improve processes for securing AI systems Key Qualifications • 3+ years of experience in Cloud Security • Bachelor’s degree in a STEM field (preferred) • Knowledge of Cloud, application, network and endpoint security and vulnerability management • Detail‑oriented, solution‑driven problem‑solver who is able to act independently as an expert • Knowledge of AWS administration, IaC (Terraform preferred) and automation (Python preferred) • Experience with MITRE ATT&CK • Some experience with ML and AI security (preferred) • Fluent in English
One Identity Manager consultant/developer/architect (She/He/They)
Accenture Polska
Wymagania
- Net
- SQL
- LDAP
- PowerShell
- Gathering business and functional requirements from the IGA/IAM area at our clients. - Designing and implementing an access role model and associated entitlements. - Designing and constructing business processes related to identity management (e.g., identity life-cycle management, access request, privilege audit). - Planning and implementing leading-edge and innovative solutions in Identity and Access Management - One Identity Manager. - Embrace new challenges and drive growth by addressing cutting-edge aspects of cyber-security that will become standard among global market leaders. - Working as an Identity technical expert (system integrator), and trusted advisor (consultant). Flexible: The work location for this role may include a mix of working remotely, onsite at a client or in an Accenture office - depending on specific project circumstances. With all our roles, there is some in-person time for collaboration, learning and building relationships with clients, peers, leaders, and communities. As an employer, we will be as flexible as possible to support your specific work/life needs.
Specjalista Cyberbezpieczeństwa (K/M)
Aflofarm Farmacja Polska
⚲ Pabianice, Łódź, Sieradz, Aleksandrów Łódzki, Piotrków Trybunalski
Wymagania
- Security
- LAN
- WAN
- Cybersecurity
- IT Security
Miejsce pracy PabianiceTwój zakres zadań: • wdrażanie rozwiązań bezpieczeństwa IT • rozwój i utrzymywanie ochrony infrastruktury przed zagrożeniami IT • prowadzanie testów bezpieczeństwa aplikacji, sieci i systemów IT • wdrażanie systemów wspomagających monitorowanie bezpieczeństwa IT oraz ochrony przed atakami informatycznymi • utrzymanie aktualnie używanych narzędzi z obszaru bezpieczeństwa • identyfikacja zagrożeń, obsługa incydentów oraz raportowanie Poszukiwane kompetencje: • praktyczne doświadczenie w obszarze monitorowania bezpieczeństwa IT z wykorzystaniem przeznaczonych do tego narzędzi analitycznych • znajomość rozwiązań z dziedziny bezpieczeństwa informatycznego oraz standardów bezpieczeństwa IT • praktyczne doświadczenie z zakresu obsługi incydentów bezpieczeństwa IT • znajomości zagrożeń na poziomie sieci WAN, LAN • umiejętność przeprowadzania analizy zagrożeń i podatności infrastruktury IT Osobie zatrudnionej oferujemy: • umowę o pracę - to u nas standard • zadbamy o Twoją formę – karta Medicover Sport oraz sekcje sportowe • zadbamy o Twoje zdrowie – prywatna opieka medyczna • zadbamy o Twój posiłek – karta Lunch Pass Sodexo • zadbamy o Ciebie – dostarczając co wtorek świeże owoce • zadbamy o Twój odpoczynek– zrefundujemy część kosztów za wakacje • zadbamy o Twój rozwój - dostęp do platformy do nauki języka angielskiego
SOC Team Lead / SOC Manager in Poland
Andersen
⚲ Warszawa, Kraków
Wymagania
- MITRE ATT/CK
- MSSP
- CSIRT
- SoC
- EDR/XDR
Andersen is hiring a SOC Team Lead / SOC Manager in Poland to build and lead a Security Operations Center, defining processes, tools, and workflows to ensure effective security monitoring and incident response. Andersen is a pre-IPO software development company that provides a full cycle of services, following project management standards and best practices. For over 19 years, we have been helping enterprises and middle-sized firms transform their businesses by creating effective digital solutions using innovative technologies. The project is focused on building and leading a Security Operations Center from scratch, including designing SOC processes, tools, and workflows to ensure effective monitoring, detection, and response to security incidents. Responsibilities: • Hiring and building a team of SOC Analysts (L1, L2, L3) from the ground up. • Leading and managing the SOC team and ensuring 24/7 operations. • Owning shift planning, SOC procedures, playbooks, and escalation protocols. • Acting as point of escalation for complex security incidents and investigations. • Defining and monitoring SOC KPIs and metrics (MTTD, MTTR, SLA compliance). • Collaborating with Threat Intelligence, Incident Response, IT and Cloud teams. • Driving tuning and improvements across SIEM, EDR/XDR, SOAR platforms. • Ensuring compliance with regulatory frameworks (ISO 27001, NIS2, etc.). • Helping with onboarding and continuous training of SOC staff. Must-haves: • Experience in security operations (SOC, CSIRT, MSSP) for 5+ years. • Experience in a SOC Team Lead, Deputy Manager, or shift-lead role for 1+ year. • Deep knowledge of security monitoring, detection, incident handling. • Experience with SIEM (e.g., Sentinel, Splunk, QRadar), EDR/XDR platforms. • Hands-on experience with incident triage, forensics, and escalation. • Strong understanding of MITRE ATT&CK, cyber kill chain, detection logic. • Level of English – from Upper-Intermediate+ and above. Nice-to-haves: • Experience building SOCs from scratch or in startup environments. • Familiarity with Microsoft Defender suite, Sentinel, and SOAR tools. • Exposure cloud-native monitoring (AWS, Azure, GCP). • Relevant certifications (e.g., GCIA, GCIH, CISSP, Azure SC-200). Reasons why this job would be interesting to you: • Andersen cooperates with such companies as Siemens, Johnson & Johnson, AstraZeneca, BNP Paribas, Allianz, Ryanair, TUI, Verivox, Media Markt, etc.. • For the past four years, our company has been growing annually by 60–100%, and we constantly involve top-notch specialists in our team. • Andersen has mentoring and adaptation systems for new employees, and transparent performance review and assessment systems will allow you to determine your development path and plan your growth. • The most important thing that we value in our employees is a commitment to continuous learning. The company supports them in this and gives them access to the best educational platforms, seminars, and practices. In addition, for over 19 years, Andersen has assembled a huge knowledge base and established a robust resource management institution. • We have been strengthening our expertise since 2007. During this time, we have formed excellent teams with streamlined processes, where you can learn something new from your colleagues every day and enjoy your work. • We are a cool young team of like-minded people communicating informally. • You'll have a stable and competitive salary and an extensive benefits package. • At Andersen, we have many different ways to grow. You can improve as a specialist or a manager, and all your activities will be decently rewarded. Your personal data is protected in accordance with GDPR regulations. Learn more: https://andersenlab.com/privacy-policy/pl Join us!
Senior Security Engineer
AirHelp
⚲ Gdańsk, Kraków, Warszawa
24 000 - 30 000 PLN netto (B2B) | 20 000 - 26 000 PLN brutto (UoP)
Wymagania
- AWS
- CI/CD
- AI
- Go
- Python
At AirHelp, we are scaling fast - expanding our products, investing in AI-powered capabilities, and redefining how millions of passengers experience air travel. But speed without security creates friction. That’s why we’re looking for a Senior Security Engineer who sees security as a growth enabler, not a blocker. This is a role for someone who wants real ownership: shaping how AI is used securely, embedding defense into developer workflows, and building modern guardrails that let Product and Engineering move fast with confidence. If you are driven by impact, enjoy solving complex problems, and want to design security for the next generation of travel tech, you’ll feel at home here. What will you drive: • Secure AI Adoption - Design and implement the governance framework for AI agents and LLM-powered tools. Establish identity controls, access boundaries, and automated guardrails that allow autonomous systems to operate safely. • Security Built Into Engineering - Partner deeply with engineers to embed automated security checks directly into CI/CD pipelines, creating a security-by-default environment without slowing delivery. • Cloud & Edge Protection - Own security controls across AWS infrastructure and optimize Cloudflare (WAF, rate limiting, and bot mitigation) to safeguard users and systems at scale. • Developer Enablement - Secure the entire developer ecosystem - from AI coding assistants to internal tooling, ensuring the inner development loop remains both fast and protected. • Threat Modeling That Drives Action - Run assessments and vulnerability reviews that drive real change, prioritizing risks and delivering fixes that matter, especially for new AI-driven product features. • Incident Leadership - Strengthen detection and response capabilities, reduce reaction times, and continuously elevate automated defense tooling. What you’ll deliver in your first 12 months: • Optimized Cloud Posture: Measurably strengthen our AWS security controls and infrastructure hardening. • Advanced AI Guardrails: Successfully deploy automated security gates specifically designed to monitor and secure our internal and external AI tool usage (e.g., preventing prompt injection or data leakage). • Hardened APIs: Raise the bar for application security by hardening critical web surfaces against common and emerging threats. • Streamlined Automation: Launch new security automations that cut manual effort in detection and response workflows, boosting visibility and speed. What sets you apart: • The "Developer First" Mindset: You have hands-on developer experience. You understand the pressures of a sprint and can speak the same language as our engineering teams to ensure security fixes are practical. • 5+ Years of Security Impact: Proven experience in cloud-native, fast-moving environments (AWS) with a deep instinct for what matters in production. • AI & LLM: You understand the unique security implications of AI usage and know how to design and build gates to mitigate them. • Automation & IaC: You are fluent in scripting (Python, Go, etc.) and Infrastructure as Code (Terraform) to scale defenses and reduce manual work. • SDLC: Confident in owning CI/CD security, managing secrets, and integrating SAST/DAST tools seamlessly into the pipeline. • Pragmatic Communication: You can translate complex security risks into clear guidance for everyone from junior devs to leadership, focusing on "How can we use this safely?" rather than "No." • Operational Maturity: You have a solid grip on security operations. While we value your overall approach to defense, prior experience configuring and fine-tuning SIEM and XDR platforms to cut through noise and identify real threats will be a distinct advantage. • Solid Grasp of Compliance: Knowledge of ISO 27001, GDPR, or SOC 2, handled with a focus on practical application rather than just paperwork. You might be interested in checking our open source contributions https://github.com/AirHelp and our tech blog: https://airhelp.tech/ Why AirHelp: • Culture of Autonomy: No micromanagement, no politics. Just builders building. • Growth Investment: Dedicated learning days, personal development plans, internal workshops, mentorship, and language classes. • Live well: Life/health insurance, private healthcare, wellbeing access (Mindgram), gym card. • Flexible Work: Choose contract type (B2B or employment), hybrid setup, 2 weeks work-from-anywhere, plus flexible benefits to choose from (gym card, various subsidies). • Stay connected: Annual travel allowance, team days, company events. • Tech you need: MacBook and top-tier tools from day one. • Extra perk: Unlimited, free access to AirHelp’s services.
Network and System Engineer
Red Global
⚲ Warszawa
Wymagania
- LAN
- Hyper-V
- Nagios
- Linux
- WAN
- VMware
Network and System Engineer I am working closely with a Global leader in construction who are looking for a Network and System Engineer that will be responsible for ensuring reliability, security and scalability of system and network infrastructures. Job Details: Start date: ASAPDuration: Initial 6 month contract (extensions highly likely) Location: Warsaw, Poland (3 days onsite per week) Languages: English C1 and Polish minimum B1 Responsibilities: • Demonstrate at least 3 years of practical experience in managing LAN/WAN networks, ideally with robust Wi-Fi, multiple firewalls and different routing protocols • Knowledge of systems and network monitoring tools like Zabbix, Nagios, Solarwinds or similar • Experience working with either Microsoft Active Directory and/or Google Workspace environments If you are interested in this opportunity please apply directly with the most up to date version of your CV and we can have a call to discuss this further.
Inżynier Bezpieczeństwa IT
TSS
⚲ Warszawa
15 000 - 18 300 PLN netto (B2B)
Wymagania
- BIA
- CISSP
- RPO
- RTO
- BCM
- CISA
- CISM
W TSS tworzymy najwyższej jakości rozwiązania z zakresu Software Development, FinTech i AI Solution. Tworzymy systemy płatnicze, bramki płatnicze online oraz rozwiązania umożliwiające innowacyjne procesowanie płatności. Nasze zespoły uczestniczą również w projektach wykonywanych dla klientów z wielu różnych branż i specjalizacji. Jeśli chcesz dołączyć do zespołu entuzjastów, dla których praca jest jednocześnie pasją, przygodą i możliwością rozwoju zawodowego dołącz do team’u TSS już teraz! Poszukujemy doświadczonego specjalisty na stanowisko Inżyniera Bezpieczeństwa IT, odpowiedzialnego za projektowanie, wdrażanie i utrzymanie mechanizmów bezpieczeństwa w środowiskach IT organizacji. Wymagania: • Posiadanie certyfikatu CISSP, CISA, CISM lub innego równoważnego obejmującego tematykę oceny systemów informatycznych pod kątem bezpieczeństwa. • Minimum 3-letnie doświadczenie w projektach na stanowisku inżyniera bezpieczeństwa IT, w tym co najmniej 2-letnie doświadczenie w analizie zagrożeń w sieciach komputerowych i aplikacjach w dużym środowisku. • Doświadczenie we wdrażaniu normy ISO27001 lub równoważnej, w tym umiejętność klasyfikacji informacji i inwentaryzacji aktywów. • Doświadczenie we wdrażaniu normy ISO22301 lub równoważnej, wspierającej zarządzanie ciągłością działania, w tym przeprowadzanie analiz RTO i RPO. • Doświadczenie w tworzeniu planów zarządzania ciągłością świadczenia usług (BCM), w tym analiz wpływu (BIA). • Doświadczenie we współpracy z klientami zewnętrznymi w zakresie analizy i precyzowania wymagań projektów. • Umiejętność analizy organizacji, procesów, architektury i infrastruktury pod kątem bezpieczeństwa IT. • Doświadczenie w analizie bezpieczeństwa środowisk chmurowych. • Umiejętność pisania dokumentów technicznych, raportów i analiz. • Znajomość zagadnień z zakresu bezpieczeństwa sieci, systemów operacyjnych oraz rozwiązań chmurowych. • Znajomość narzędzi do analizy bezpieczeństwa urządzeń, protokołów sieciowych i aplikacji. • Wysokie zdolności analityczne, interpersonalne i komunikacyjne. • Znajomość języka angielskiego umożliwiająca swobodną komunikację o tematyce technicznej. Zakres obowiązków: • Planowanie i prowadzenie testów bezpieczeństwa aplikacji i infrastruktury, raportowanie podatności. • Opracowywanie architektury bezpieczeństwa dla budowanych rozwiązań. • Projektowanie architektury rozwiązań chmurowych w zakresie bezpieczeństwa infrastruktury, usług i mechanizmów zarządzania. • Planowanie wdrożeń i wsparcie w nadzorze implementacji mechanizmów bezpieczeństwa. • Przygotowywanie wycen i kosztorysów prac związanych z zakupem i wdrożeniem mechanizmów bezpieczeństwa. • Analiza i opiniowanie pod kątem bezpieczeństwa zmian architektonicznych, aplikacyjnych i infrastrukturalnych oraz specyfikowanie wymagań bezpieczeństwa. • Wsparcie we wdrożeniach i bieżącym utrzymaniu systemów bezpieczeństwa klasy SIEM, DAM, NGFW, WAF, IPS/IDS, analizatory Netflow i innych. • Tworzenie, opiniowanie i utrzymywanie dokumentacji bezpieczeństwa. • Współpraca z innymi zespołami organizacyjnymi w ramach realizowanych działań Co oferujemy? • Możliwość pracy w pełni zdalnej lub w biurze w Warszawie; • Stabilną współpracę na podstawie B2B; • Dofinansowanie do prywatnej opieki medycznej w PZU; • Wsparcie w rozwoju zawodowym - wewnętrzne szkolenia z zakresu cyberbezpieczeństwa;
Specjalistka/Specjalista ds. edukacji o cyberbezpieczeństwie
PKO Bank Polski
⚲ Warszawa
Wymagania
- cyberbezpieczeństwo
Na co dzień w naszym zespole: • przygotowujesz i przeprowadzasz szkolenia i warsztaty z obszaru cyberbezpieczeństwa dla pracowników i klientów banku (online i stacjonarnie), • przekazujesz wiedzę na temat cyberzagrożeń związanych z technologią i światem cyfrowym, • przygotowujesz założenia do programów szkoleń i kampanii uświadamiających z zakresu cyberbezpieczeństwa oraz monitorujesz stopień ich realizacji, we współpracy z właściwą komórką organizacyjną banku, • realizujesz zadania związane z przygotowywaniem treści i materiałów edukacyjnych dotyczących cyberbezpieczeństwa dla pracowników i klientów banku, • uczestniczysz w zapewnieniu zgodności przepisów wewnętrznych z zakresu cyberbezpieczeństwa z wymaganiami prawnymi oraz standardami branżowymi, • przygotowujesz raporty i informacje zarządcze z zakresu realizowanych zadań, • współpracujesz z podmiotami zewnętrznymi w zakresie realizowanych projektów oraz nadzorujesz realizację przydzielonego budżetu. To stanowisko może być Twoje, jeśli: • masz min. 3-5 lat doświadczenia zawodowego w sektorze finansowym, w obszarze cyberbezpieczeństwa lub bezpieczeństwa informatycznego, • masz doświadczenie w organizacji szkoleń, warsztatów i innych form edukacyjnych, • znasz standardy ISO 27000, NIS2, regulacje i wytyczne KNF, ustawy i rozporządzenia dotyczące cyberbezpieczeństwa np. UKSC, DORA, • masz wiedzę na temat cyberzagrożeń i ciągle ją aktualizujesz, • znasz działania bankowości elektronicznej, narzędzi autoryzacyjnych, • jesteś osobą komunikatywną i masz lekkie pióro (łatwo przychodzi Ci pisanie artykułów i komunikatów), • jesteś osobą zroganizowaną i potrafisz planować pracę własną, • cechuje Cię duża kreatywność i innowacyjność, • masz możliwość wyjazdów służbowych kilka razy w miesiącu. Twój pakiet korzyści: • docenienie działania i zaangażowania - oprócz wynagrodzenia, każdy z nas ma określone cele, które doceniamy w ramach systemów premiowych, • oferta specjalna - wspieramy Twoje finanse i oferujemy produkty naszej Grupy Kapitałowej na preferencyjnych warunkach (m.in. kredyt hipoteczny, kartę kredytową czy ubezpieczenie) oraz pomagamy odkładać na emeryturę w PPE, • elastyczność benefitów - różnimy się, dlatego to Ty wybierasz z jakich benefitów skorzystasz; mamy dla Ciebie system kafeteryjny lub działania w ramach ZFŚS, m.in. dofinansowanie opieki nad dziećmi, wakacji czy pożyczkę na remont, • możliwości rozwoju - u nas masz szerokie perspektywy rozwoju i możesz uczyć się, jak lubisz; oferujemy dostęp do różnych form nauki, stacjonarnie i cyfrowo, • wsparcie w zdrowiu i odpoczynku - dbamy o naszą formę mentalną i fizyczną; możesz skorzystać z kart sportowych, opieki medycznej LuxMed, stomatologa, programu wellbingowego #FokusNaCiebie czy dodatkowych dni wolnych.
Senior Analyst Incident Response (Information Security)
Motorola Solutions
⚲ Kraków
13 000 - 18 000 PLN brutto (UoP)
Wymagania
- SOAR
- SIEM
- Incident Response
Our IT organization isn’t just here to support our business. We’re here to reinvent it – by changing the way our customers, partners and employees interact with our company. To do that, we’re looking for people who bring great ideas and who make our partners’ ideas better. Intellectually curious advisors (not order takers) who focus on outcomes to creatively solve business problems. People who not only embrace change, but who accelerate it. Job Description We are seeking a talented and battle-tested individual to join our team as a Senior Cyber Defense Professional at Motorola Solutions. As a global technology enterprise, we face various security threats, both internal and external. In this role, you will have the opportunity to combat advanced adversaries and enhance our security posture through threat hunting, security architecture, vulnerability management, and digital forensics. You will play a crucial role in our world-class information security program, designing innovative methods to detect attacks, analyzing emerging attack techniques, and collaborating with the team to develop effective tools and solutions. You will not just be "working tickets." You will be the primary investigator for high-impact security events, a proactive threat hunter, and a mentor to our junior staff. We are looking for a practitioner who focuses on outcomes: reducing attacker dwell time, automating repetitive tasks, and ensuring that every incident leads to a permanent improvement in our security posture.We are looking for someone who is passionate about learning, thrives on challenges, and is eager to contribute to our future success. Strong collaboration, communication, and a team-oriented mindset are essential for this role. MSI provides a work environment that encompasses workplace flexibility, continued professional growth through paid training & certifications, conferences and seminars, along with education assistance. Our culture encourages the honing of current skills and building of new capabilities. We prize flexibility, continuous improvement, and collaboration both within the team as well as with industry peers. If you are excited about the prospect of contributing to a dynamic and challenging environment where you can make a real impact in the field of information security, we look forward to receiving your application. Skills and attributes for success: • Self-driven, creative, and can operate independently • Technical expertise • Continuously learning and identifying ways to strengthen and advance MSI’s Incident Response program • Thorough understanding of cybersecurity principles • Strong oral and written communication skills with a desire to share thoughts and ideas Responsibilities: Incident Leadership & Execution (Core Duties) • Lead and Manage Incidents: Act as the Incident Response Lead (IRL) for low to high-severity and complex security incidents, directing the response, containment, eradication, and recovery efforts across affected teams • Conduct Advanced Investigation: Perform deep-dive analysis of security incidents using advanced forensic techniques (host, memory, network) to determine the scope, cause, and impact of the breach • Perform Root Cause Analysis: Identify the source, vulnerability, and sequence of events that led to the incident, providing detailed findings to inform security improvements. • Execute Threat Containment: Develop and implement immediate and effective containment strategies (e.g., isolating systems, revoking access, blocking malicious traffic) to minimize damage and prevent further proliferation of the threat • Post-Incident Leadership: Lead AAR (after action reviews) & "Lessons Learned" sessions to translate incident findings into actionable changes • Mentor and Coach: Provide mentorship and training to junior analysts on advanced incident response techniques, forensic analysis, and security tool usage • Projects Partispation: Lead project initiatives and participate as a contributing member on supporting cybersecurity initiative Detection, Analysis, and Hunting • Monitor and Triage Escalations: Serve as the final escalation point for the Security Operations Center (SOC), validating and adjudicating high-priority security alerts and anomalies • Proactive Threat Hunting: Design and execute proactive threat hunting operations using threat intelligence and anomaly detection techniques to identify undetected malicious activity across the enterprise environment • Malware Analysis: Analyze malicious code (static and dynamic) and artifacts to understand their capabilities, targets, and C2 infrastructure, and extract Indicators of Compromise (IOCs) • Detection Engineering: Tune rules and develop new high-fidelity detections based on findings from Purple Team events, threat hunting, and incidents • EDR & SIEM, and Log Analysis: Expertly utilize endpoint detection and SIEM platforms to correlate events, review system and network logs, and develop new custom queries and detection rules • Network Traffic Analysis: Analyze network packet captures (PCAP) and flow data to identify lateral movement, data exfiltration, and communication with external threat actors Process Improvement & Strategy • Develop and Refine Playbooks: Create, update, and maintain detailed Incident Response (IR) plans, runbooks, and Standard Operating Procedures (SOPs) to ensure consistency and efficiency in incident handling • Evaluate and Tune Security Tools: Propose and implement improvements to existing security tools (EDR, SIEM, SOAR, Firewalls, IDS/IPS) and detection logic to enhance the organization's security posture and reduce false positives • Partner with the Threat Intelligence: Incorporate findings from the organization's threat intelligence strategy into incident investigations, ensuring threat data is actionable and integrated into defense systems Communication, Documentation, and Compliance • High-Level Reporting and Briefings: Prepare and deliver clear, concise written and verbal reports, after-action review (AAR), and executive summaries to technical & non-technical stakeholders on incident status, impact, and lessons learned • Regulatory Compliance: Work with GRC team to ensure all incident response activities are conducted in accordance with legal and regulatory requirements (e.g., data breach notification laws, internal policies) • Coordinate with Stakeholders: Collaborate closely with IT, Legal, Human Resources, and external vendors/partners throughout an incident to ensure a coordinated and effective response • On-Call Support: Participate in an on-call rotation to provide 24/7 incident response coverage for critical security events • Monitor specific cyber threat actors to understand tactics and techniques • Prepare reports documenting security incidents and damage assessment • Review logs to identify unusual behavior in networks and endpoint devices • Perform forensic analysis as necessary • Drive lessons learned and remediation efforts organization-wide • Recommend security enhancements to management or the team • Experience with scripting and programming languages such as Python, PowerShell, or any other modern language • Understanding of programming concepts and a security-first approach in developing programs. • Develop scripts and tools using modern programming languages. • Solve complex problems through logical thinking. • Prototype new technologies. • Gather business requirements and support database, server, and script managemen Basic Requirements Requirements: • Knowledge and training in Information Security, Computer Systems Engineering, or Network Engineering. • Understanding of tasks required of Security Operations Center (SOC) analyst and the relationship with the Incident Respose team • Experience with networking fundamentals (TCP/IP, HTTP minimum) • Familiarity with major operating systems available (Windows, Linux, and MacOS) • Ability to piece together small pieces of information from multiple sources to tell a larger story • Knowledge of major attack types (Malware-based, Identity-based, Social Engineering, Infrastructure, or Supply Chain) • Understanding of vulnerabilities and exploits. • Familiarity with analyzing and distilling logs (firewall, web application, Active Directory) • Familiarity with MITRE ATT&CK & Lockheed Cyber Kill Chain • Familiarity with security tools & technologies:• EDR: CrowdStrike, SentinelOne, Palo Alto Cortex XDR, Microsoft Defender • SIEM: Splunk, Elastic, Palo Alto Cortex XSIAM, Microsoft Azure Sentinel • SOAR: Splunk SOAR, Palo Alto Cortex XSOAR, Microsoft Sentinel, IBM QRadar, Google Security Operations, Rapid7 InsightConnect • Ability to script in Shell (Bash or Powershell) & Python • Experience conveying complex information in simple, succinct explanations • Ability to work in a fast-paced, operational environment, including non-standard work hours in response to Information Security incidents
SIEM Consultant
Capgemini Polska
⚲ Kraków, Katowice, Wrocław, Gdańsk, Opole
Wymagania
- Microsoft Defender
- Tanium
- Microsoft Sentinel
- SoC
- SOAR
- SIEM
- Crowdstrike
- AZ500
- Cybereason
- Splunk
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you’d like, where you’ll be supported and inspired by a collaborative community of colleagues around the world, and where you’ll be able to reimagine what’s possible. Join us and help the world’s leading organizations unlock the value of technology and build a more sustainable, more inclusive world. YOUR TASKS • Identify, define and document system security requirements and recommend solutions to management. • Research and evaluate new security technologies and make recommendations for implementation. • Partner with cross-functional infrastructure teams to ensure security maturity work is being prioritized and addressed. • Handle the configuration and troubleshooting of client security infrastructure devices, including SIEM systems and other XDR components. • Optimize Detection Accuracy, Trend Analysis and Fine-Tuning: Tune system rules and correlation searches to enhance detection capabilities. • Develop Automation and Efficiencies: Leverage your knowledge and experience to develop automation processes, enhance efficiencies, and implement best practices. • Oversee the deployment, configuration, and ongoing optimization of security platforms to ensure accurate and efficient event collection, licensing, correlation, and alerting. YOUR PROFILE • Professional experience in SOC tooling such as SIEM and Endpoint services (Splunk, Microsoft Sentinel, Defender for Endpoint etc.) • German language • Relevant industry certifications (e.g., AZ500, Splunk ES Admin) • Experience with various Endpoint protection platforms, such as MS Defender, CrowdStrike, Tanium, Cybereason, etc. • Experience with various SOAR platforms • Strong analytical and problem-solving skills • Knowledge of security best practices and concepts • Strong understanding of network and endpoint security, firewalls, intrusion detection/prevention systems (IDS/IPS). • Nice to have: possession of one of the following security certifications: CISSP, CCSP, CCSK, CISM, CISA. • Nice to have: French language WHAT YOU’LL LOVE ABOUT WORKING HERE • Practical benefits: yearly financial bonus, private medical care with Medicover with additional packages (e.g., dental, senior care, oncology) available on preferential terms, life insurance and access to NAIS benefit platform. • Access to over 70 training tracks with certification opportunities (e.g., GenAI, Excel, Business Analysis, Project Management) on our NEXT platform. Dive into a world of knowledge with free access to Education First languages platform, Pluralsight, TED Talks, Coursera and Udemy Business materials and trainings. • Cutting-Edge Technology: Position yourself at the forefront of IT innovation, working with the latest technologies and platforms. Capgemini partners with top global enterprises, including 145 Fortune 500 companies. • Enjoy hybrid working model that fits your life - after completing onboarding, connect work from a modern office with ergonomic work from home, thanks to home office package (including laptop, monitor, and chair). Ask your recruiter about the details. GET TO KNOW US Capgemini is committed to diversity and inclusion, ensuring fairness in all employment practices. We evaluate individuals based on qualifications and performance, not personal characteristics, striving to create a workplace where everyone can succeed and feel valued. Do you want to get to know us better? Check our Instagram — @capgeminipl or visit our Facebook profile — Capgemini Polska. You can also find us on YouTube. ABOUT CAPGEMINI Capgemini is a global leader in partnering with companies to transform and manage their business by harnessing the power of technology. The Group is guided everyday by its purpose of unleashing human energy through technology for an inclusive and sustainable future. It is a responsible and diverse organization of over 360,000 team members globally in more than 50 countries. With its strong 55-year heritage and deep industry expertise, Capgemini is trusted by its clients to address the entire breadth of their business needs, from strategy and design to operations, fueled by the fast evolving and innovative world of cloud, data, AI, connectivity, software, digital engineering and platforms. Apply now!
Koordynator ds. Systemu Radiowego (TETRA)
Ness Solution
⚲ Poznań
130 - 180 PLN/h netto (B2B)
Wymagania
- LAN
- SEP E
- teleinformatyka
- łączność radiowa
📡 Koordynator ds. Systemu Radiowego (TETRA) 🏢 Poznań – Jeżyce | praca stacjonarna 🤝 B2B | 130–180 PLN/h Szukamy doświadczonego specjalisty, który chce odpowiadać za stabilność, rozwój i bezpieczeństwo systemu łączności radiowej TETRA w krytycznej infrastrukturze. Jeśli dobrze czujesz się w środowisku technicznym, lubisz mieć realny wpływ na działanie systemów i nie boisz się odpowiedzialności — to może być rola dla Ciebie. 🔧 Zakres obowiązków: • Monitorowanie i zapewnianie ciągłości pracy systemu TETRA oraz jego komponentów • Konfiguracja infrastruktury TETRA, urządzeń radioliniowych i stacji abonenckich • Zarządzanie alarmami oraz nadzór nad rejestracją i archiwizacją korespondencji radiowej • Wsparcie techniczne przy awariach, przeglądach i rekonfiguracjach systemu • Prowadzenie dokumentacji technicznej, raportowanie pracy systemu • Udział w rozwoju systemu i wdrażaniu nowych rozwiązań technicznych ✅ Wymagania: • Wykształcenie techniczne (telekomunikacja, radiokomunikacja, teleinformatyka lub pokrewne) • Doświadczenie w administrowaniu systemami teleinformatycznymi / radiokomunikacyjnymi • Znajomość nowoczesnych systemów bezprzewodowych i sieci LAN • Umiejętność analizy, samodzielnego rozwiązywania problemów i dobrej organizacji pracy • Prawo jazdy kat. B • Podstawowa znajomość języka angielskiego (terminologia techniczna) • Gotowość do uzyskania uprawnień SEP E (jeśli brak) 🎁 Oferujemy: • B2B: 130–180 PLN/h • Stabilny, długoterminowy projekt • Realny wpływ na systemy o znaczeniu krytycznym • Preferencyjne pakiety do wykupienia: Multisport i Luxmed • Pracę w doświadczonym, technicznym środowisku 👉 Zainteresowany/a? Wyślij CV lub daj znać — chętnie opowiem więcej o projekcie i zespole 😊
Junior IAM Analyst
B2Bnetwork
⚲ Gdynia
45 - 55 PLN/h netto (B2B)
Wymagania
- IAM
- Access Control
- SailPoint IdentityIQ
- IT Security
- Microsoft Office Excel
Key Responsibilities • Analyze user account and access rights data across systems • Compare and validate data between target applications and SailPoint IIQ • Reach out to application owners/managers to gather missing data and documentation • Explain IAM-related concepts and documentation requirements in a clear and concise manner • Prepare audit documentation and collect necessary evidence for internal and external auditors • Ensure data accuracy, completeness, and compliance with IAM policies Must-Have Requirements • Basic understanding of IAM concepts (user accounts, access rights, entitlements, roles) • Analytical mindset and attention to detail • Good communication skills – ability to explain technical concepts in simple terms • Experience working with data (e.g., Excel, system exports, or reports) Nice-to-Have • Familiarity with SailPoint IdentityIQ or other IAM tools • Experience working with auditors or compliance teams • Previous experience in IT, security, or access control-related roles