We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
No cookies to display.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
No cookies to display.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
No cookies to display.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
No cookies to display.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
No cookies to display.
Filters
An expert in IT auditing (both internal and external) with hands on experience in information and cyber security, IT Security Governance and compliance domains which span across various industries including technology outsourcing, software development, banking and finance
A Cyber Security Undergraduate with one year industry exposure having sound knowledge of Common Tools & Frameworks: Nessus, Acunetix, Burp suite, MITRE ATT&CK, Security Monitoring and Analyzing - (Dark Trace, Crowd Strike, ArcSight), Vulnerability Assessments (VA) and Compliance Scans - (Nessus, Acunetix) and Malware Analyzing.
Stellar cyber SIEM portal, Working with Jira ticketing system, Rapid7, Nexpose, Lockheed Martin Kill chain and Open XDR (MITRE ATT&CK compatible) kill chain, Troubleshooting related to stellar cyber siem and Nexpose, Linux/windows OS, Firewall security and IPS/IDS protection, Cloud Platform Knowledge (AWS)
Reading: Master's degree | Vulnerability Assessment & Penetration Testing, Secure Code Review, SAST/DAST, Reverse Engineering, Malware Analysis & Digital Forensics, Network & Endpoint Security Monitoring, IDS/IPS, Firewall, WAP, SIEM, Honeyports | IDS/IPS/ Firewall | Kali Linux, Acunetix Web Vulnerability Scanner | OWASP, PTES, ISO 27001, PCI DS
Java, Mobile Application Development, Vulnerability Assessment & Penetration Testing, Python, Competent knowledge about Cybersecurity Frameworks such as ISO 27001, NIST, COBIT, GDPR.
A beginner level Cyber Security Analysist with Cybersecurity Malware Analysis Python Scripting, Automation/Devops Network Management, Intrusion Detection Reverse Engineering, Secure Software Development, Vulnerability Assessment skills.
SIEM Monitoring, CB Monitoring, working with WAF and Mail Gateway, Internal VPN handling, Internal AV Monitoring, investigate security breaches and other cyber security incidents, Engage to Ongoing Implementation for a DLP Solution
Implementing Information Security Management System, Perform Business Impact Analysis, Risk Assessments, Data Scanning and Classification exercises, firewall reviews, SIEM reviews, WAF and DLP policy reviews, Conduct information security awareness sessions, phishing simulation exercises and induction programs related to security
Software Development, Database Administration & Cyber Analyst, Involved in Human Resource Management., Skills: MSSQL, Linux, Forensics Investigation, Python, IT Troubleshooting & Problem Solving, Computer operating systems, Hardware and Software, Microsoft Office
Web Vulnerability, SOC Operation, Risk management Cycle, Change management Cycle, Scanners & analyzers, Ethical Hacking, Linux OS, Bash Scripting, IP Networking, Networked information systems, Troubleshooting, OSI Layers, TCP/IP Protocols, VPN, switching, routing, IPsec, Windows Administration & Active Directory, Routing Protocols, Python, C++.
Met trots stellen wij onze mensen aan jou voor, hoogopgeleide Engelstalige IT’ers. Wie is het meest geschikt voor jouw opdracht?
Ru Métiers beschikt over een pool van toppers, die op afstand operationeel zijn, soms intercontinentaal en vlot beschikbaar. In onze databank presenteren wij meer dan 1200 profielen van kwalitatief sterke IT-professionals.
Wij nemen met voorrang contact met jou op.