#1 Job Board for tech industry in Europe

  • Job offers
  • All offersWrocławSecurityInformation Security Engineering Team Lead
    Information Security Engineering Team Lead
    new
    Security
    GR8 Tech

    Information Security Engineering Team Lead

    GR8 Tech

    Wrocław
    Type of work
    Full-time
    Experience
    Mid
    Employment Type
    B2B
    Operating mode
    Remote

    Tech stack

      AWS

      regular

      Ansible

      regular

      Azure

      regular

      VPN

      regular

      Terraform

      regular

      Linux

      regular

      Cybersecurity

      regular

      Nessus

      regular

    Job description

    This role is responsible for overseeing the implementation and maintenance of security policies, procedures, and tools to protect the network, cloud and data center infrastructure, endpoints, and overall data of the company. This includes defining the security objectives, standards, and best practices, as well as identifying the security risks and vulnerabilities to protect corporate infrastructure and corporate perimeter from threats.


    About your key responsibilities and impact:

    1. Network Security

    — Architecting, implementing, and managing network security controls, such as firewalls, intrusion detection/prevention systems (IDS/IPS), network segmentation, and secure VPNs;

    — Defining and supporting security profiles for corporate VPN;

    — Supporting and securing 3d party connections to the corporate infrastructure;

    — Collaborating with network engineering teams to design and deploy secure network architectures and configurations that mitigate security risks and ensure data confidentiality, integrity, and availability.


    2. Endpoint Security

    — Designing, implementing, and maintaining endpoint security solutions, including endpoint detection and response (EDR), and endpoint management platforms, DLP agents;

    — Developing and enforcing endpoint security policies, configurations, and standards to protect laptops from malware, unauthorized access, and data breaches;

    — Conducting regular vulnerability assessments and patch management activities to address security vulnerabilities and ensure endpoint compliance with security standards;


    3. Cloud & Infrastructure Security

    — Designing and architecting secure cloud solutions based on industry best practices and security principles;

    — Designing and implementing security controls for AWS cloud environments and data center infrastructure, ensuring alignment with security best practices and compliance requirements;

    • — Designing a set of requirements to harden infrastructure components.


    Essential professional experience:

    • In-depth knowledge of cybersecurity concepts, tools, principles, best practices and technologies;
    • Ability to develop and execute long-term security strategies to address evolving threats and risks;
    • Knowledge of common security threats, vulnerabilities, attack vectors, and mitigation strategies across application, infrastructure, and network layers;
    • Deep knowledge of implementing security controls and configurations as code using tools such as Terraform, Ansible;
    • In-depth understanding of endpoint security technologies and OS security configuration best practices (Linux, Windows, macOS);
    • Proficiency in antivirus software, endpoint detection and response (EDR), endpoint management platform, DLP for laptops and mobile devices;
    • Strong understanding of firewall technologies, including packet filtering, and stateful inspection;
    • Expertise in application layer filtering;
    • Experience with designing and implementing firewall rules to enforce security policies;
    • Expertise in configuring and managing Intrusion Detection/Prevention Systems (IDS/IPS) to detect and block malicious activities on the network;
    • Proficiency in Virtual Private Network (VPN) technologies for securing remote access and site-to-site communications, including the configuration of VPN concentrators, authentication methods, and encryption protocols;
    • Knowledge of device authentication mechanisms and protocols;
    • Strong understanding of security controls and skills of their administration in one of the popular cloud providers (AWS, GCP, Azure);
    • Knowledge of vulnerability management processes, including vulnerability scanning, prioritization, remediation, and tracking using tools like Nessus, Qualys, or OpenVAS;
    • Expertise in securing containerized applications and orchestrators like Docker, Kubernetes, and Docker Swarm, including container image scanning, runtime security, and access control;
    • Experience in defining, provisioning, and managing infrastructure resources using code, ensuring consistent and secure deployment environments;
    • Familiarity with security governance frameworks, policies, standards, and regulatory requirements (e.g., GDPR, PCI DSS, ISO/IEC 27001);
    • English: B2.


    What we offer:


    Benefits Cafeteria:

    • Sports compensation;
    • Medical coverage;
    • Psychological support;
    • Home-office coverage.


    Work-life:

    • Remote work, Coworking compensation;
    • Childcare budget;
    • Maternity leave;
    • Paternity leave;
    • Additional 2 days for family events.


    Our GR8 Culture:

    • Open feedback and transparent direct communications;
    • Growth and development: better every day;
    • High tolerance to experiment and mistakes;
    • Supportive friendly environment.


    Check similar offers

    IT Security Architect

    IT Security Architect

    New
    E Net Production Sp. z o.o.
    3.75K - 5.71K USD
    Bielsko-Biała
    , Fully remote
    Fully remote
    application architecture
    IT Documentation
    Application Security
    IP Security System Engineer - Automotive

    IP Security System Engineer - Automotive

    New
    Link Group
    6.1K - 7.84K USD
    Kraków
    , Fully remote
    Fully remote
    Security
    Autosar
    strongSwan
    Operational Technology SME

    Operational Technology SME

    New
    Avenga
    8.71K - 9.8K USD
    Białystok
    , Fully remote
    Fully remote
    OT Cybersecurity
    Cybersecurity
    IT Security
    Inżynier systemów zabezpieczeń

    Inżynier systemów zabezpieczeń

    New
    PKO BP Finat
    Undisclosed Salary
    Poznań
    , Fully remote
    Fully remote
    Radius
    Trellix – d. FireEye
    NAC
    IAM Consultant

    IAM Consultant

    New
    Accenture
    Undisclosed Salary
    Wrocław
    zarządzanie tożsamością
    IAM/PAM
    One Identity