Filters
An expert in IT auditing (both internal and external) with hands on experience in information and cyber security, IT Security Governance and compliance domains which span across various industries including technology outsourcing, software development, banking and finance
A Cyber Security Undergraduate with one year industry exposure having sound knowledge of Common Tools & Frameworks: Nessus, Acunetix, Burp suite, MITRE ATT&CK, Security Monitoring and Analyzing - (Dark Trace, Crowd Strike, ArcSight), Vulnerability Assessments (VA) and Compliance Scans - (Nessus, Acunetix) and Malware Analyzing.
Stellar cyber SIEM portal, Working with Jira ticketing system, Rapid7, Nexpose, Lockheed Martin Kill chain and Open XDR (MITRE ATT&CK compatible) kill chain, Troubleshooting related to stellar cyber siem and Nexpose, Linux/windows OS, Firewall security and IPS/IDS protection, Cloud Platform Knowledge (AWS)
Reading: Master's degree | Vulnerability Assessment & Penetration Testing, Secure Code Review, SAST/DAST, Reverse Engineering, Malware Analysis & Digital Forensics, Network & Endpoint Security Monitoring, IDS/IPS, Firewall, WAP, SIEM, Honeyports | IDS/IPS/ Firewall | Kali Linux, Acunetix Web Vulnerability Scanner | OWASP, PTES, ISO 27001, PCI DS
Java, Mobile Application Development, Vulnerability Assessment & Penetration Testing, Python, Competent knowledge about Cybersecurity Frameworks such as ISO 27001, NIST, COBIT, GDPR.
A beginner level Cyber Security Analysist with Cybersecurity Malware Analysis Python Scripting, Automation/Devops Network Management, Intrusion Detection Reverse Engineering, Secure Software Development, Vulnerability Assessment skills.
SIEM Monitoring, CB Monitoring, working with WAF and Mail Gateway, Internal VPN handling, Internal AV Monitoring, investigate security breaches and other cyber security incidents, Engage to Ongoing Implementation for a DLP Solution
Implementing Information Security Management System, Perform Business Impact Analysis, Risk Assessments, Data Scanning and Classification exercises, firewall reviews, SIEM reviews, WAF and DLP policy reviews, Conduct information security awareness sessions, phishing simulation exercises and induction programs related to security
Software Development, Database Administration & Cyber Analyst, Involved in Human Resource Management., Skills: MSSQL, Linux, Forensics Investigation, Python, IT Troubleshooting & Problem Solving, Computer operating systems, Hardware and Software, Microsoft Office
Web Vulnerability, SOC Operation, Risk management Cycle, Change management Cycle, Scanners & analyzers, Ethical Hacking, Linux OS, Bash Scripting, IP Networking, Networked information systems, Troubleshooting, OSI Layers, TCP/IP Protocols, VPN, switching, routing, IPsec, Windows Administration & Active Directory, Routing Protocols, Python, C++.
Met trots stellen wij onze mensen aan jou voor, hoogopgeleide Engelstalige IT’ers. Wie is het meest geschikt voor jouw opdracht?
Ru Métiers beschikt over een pool van toppers, die op afstand operationeel zijn, soms intercontinentaal en vlot beschikbaar. In onze databank presenteren wij meer dan 1200 profielen van kwalitatief sterke IT-professionals.
Wij nemen met voorrang contact met jou op.