#Резюме #CV #DevSecOps #CISO #SecurityOfficer #ChiefInformationSecurityOfficer #Fulltime #Remote #BusinessTrips
DevSecOps / CISO in DeFi or Crypto (EVM, L2, TON).
▪️Salary. DevSecOps: 7777$. CISO: 13337$. Up to 50% in tokens.
Experienced DevSecOps specialist with 2 years in DevSecOps, 4 years in DevOps and 8 years in Cyber Security and IT. In crypto security since 2017, also security officer experience in a big Payment Service Provider (PSP).
▪️ What can I do for you:
▫️ Design and implement security solutions;
▫️ Risk analysis and management;
▫️ Backup testing and disaster recovery planning;
▫️ Identity and Access Management;
▫️ Business Continuity Planning;
▫️ Cloud Native security techniques and tactics;
▫️ Scan your code and cloud infrastructure;
▫️ Place honeypots and conduct internal and external pen tests;
▫️ Design and implement bug bounty programs;
▫️ CI/CD + IaC security and monitoring;
▫️ Research, incident response, forensics, and post-mortems;
▫️ Worldwide conferences, webinars, AMAs on security-related topics.
▪️ What I may use for it:
▫️ AWS, K8S, EKS, GCP;
▫️ CISSP, CIS, PCI DSS, SSDLC;
▫️ Agile, Kanban, Scrum, GitOps;
▫️ OWASP, CWE and MITRE ATT&CK;
▫️ mTLS, PKI, SBOM, CVE;
▫️ SAST, SCA, DAST, etc;
▫️ Security first, Zero Trust, Shift Left, DRY, KISS, Secure by design;
▫️ SIEM, IDS/IPS, monitoring stacks.
▪️Public material: https://mirror.xyz/0xdc519466f1cda17e8ae6735bB8652F47c0533CBe/
Contacts: @es31338
Blockchain Hunter: @workingincrypto
DevSecOps / CISO in DeFi or Crypto (EVM, L2, TON).
▪️Salary. DevSecOps: 7777$. CISO: 13337$. Up to 50% in tokens.
Experienced DevSecOps specialist with 2 years in DevSecOps, 4 years in DevOps and 8 years in Cyber Security and IT. In crypto security since 2017, also security officer experience in a big Payment Service Provider (PSP).
▪️ What can I do for you:
▫️ Design and implement security solutions;
▫️ Risk analysis and management;
▫️ Backup testing and disaster recovery planning;
▫️ Identity and Access Management;
▫️ Business Continuity Planning;
▫️ Cloud Native security techniques and tactics;
▫️ Scan your code and cloud infrastructure;
▫️ Place honeypots and conduct internal and external pen tests;
▫️ Design and implement bug bounty programs;
▫️ CI/CD + IaC security and monitoring;
▫️ Research, incident response, forensics, and post-mortems;
▫️ Worldwide conferences, webinars, AMAs on security-related topics.
▪️ What I may use for it:
▫️ AWS, K8S, EKS, GCP;
▫️ CISSP, CIS, PCI DSS, SSDLC;
▫️ Agile, Kanban, Scrum, GitOps;
▫️ OWASP, CWE and MITRE ATT&CK;
▫️ mTLS, PKI, SBOM, CVE;
▫️ SAST, SCA, DAST, etc;
▫️ Security first, Zero Trust, Shift Left, DRY, KISS, Secure by design;
▫️ SIEM, IDS/IPS, monitoring stacks.
▪️Public material: https://mirror.xyz/0xdc519466f1cda17e8ae6735bB8652F47c0533CBe/
Contacts: @es31338
Blockchain Hunter: @workingincrypto