Staff Security Engineer(Insider Threat Counter Operation)

Seoul, South Korea

โš ๏ธ We'll shut down after Aug 1st - try foo๐Ÿฆ for all jobs in tech โš ๏ธ

Coupang

Join us to innovate. Rocket your career. Collaborate with teams across the globe. Find your role and learn more about our culture.

View all jobs at Coupang

Apply now Apply later

English follows Korean.

ย 

ํšŒ์‚ฌ ์†Œ๊ฐœย 

์ฟ ํŒก์€ ๊ณ ๊ฐ ๊ฐ๋™ ์‹คํ˜„์„ ์œ„ํ•ด ์กด์žฌํ•ฉ๋‹ˆ๋‹ค. ๊ณ ๊ฐ๋“ค์ด "์ฟ ํŒก ์—†์ด ๊ทธ๋™์•ˆ ์–ด๋–ป๊ฒŒ ์‚ด์•˜์„๊นŒ?" ๋ผ๊ณ  ๋งํ•  ๋•Œ, ๋น„๋กœ์†Œ ์šฐ๋ฆฌ์˜ ๋ฏธ์…˜์„ ์‹คํ˜„ํ•˜๊ณ  ์žˆ์Œ์„ ์•Œ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ ๊ฐ๋“ค์˜ ์‡ผํ•‘๊ณผ ์‹์‚ฌ, ์ƒํ™œ ์ „๋ฐ˜์„ ํŽธํ•˜๊ฒŒ ๋งŒ๋“ค๊ฒ ๋‹ค๋Š” ์œ ์ผํ•œ ์ง‘๋…์œผ๋กœ ์ฟ ํŒก์€ ์ˆ˜์–ต ๋‹ฌ๋Ÿฌ ๊ทœ๋ชจ์˜ ์ด์ปค๋จธ์Šค ์‚ฐ์—… ์ „๋ฐ˜์˜ ํ˜์‹ ์„ ์ด๋Œ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ฟ ํŒก์€ ๊ฐ€์žฅ ๋น ๋ฅด๊ฒŒ ์„ฑ์žฅํ•˜๋Š” ์ด์ปค๋จธ์Šค ๊ธฐ์—… ์ค‘ ํ•˜๋‚˜๋กœ, ๊ตญ๋‚ด ์ปค๋จธ์Šค ์—…๊ณ„์—์„œ์˜ ๋…๋ณด์ ์ธ ์ž…์ง€์™€, ๊ณ ๊ฐ ์‹ ๋ขฐ๋ฅผ ๊ตฌ์ถ•ํ–ˆ์Šต๋‹ˆ๋‹ค.ย ย ย ย 

์ฟ ํŒก์€ ์Šคํƒ€ํŠธ์—… ๋ฌธํ™”๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ ๊ธ€๋กœ๋ฒŒ ๋Œ€ํ˜• ์ƒ์žฅ์‚ฌ๋ผ๊ณ  ์ž๋ถ€ํ•ฉ๋‹ˆ๋‹ค. ์ด๊ฒƒ์ด ์ฐฝ๋ฆฝ ๋‹น์‹œ์˜ ๊ธฐ๋ฏผํ•จ์„ ์ง€ํ•˜๋ฉฐ, ์‹ ๊ทœ ์„œ๋น„์Šค๋ฅผ ๋Š์ž„์—†์ด ์ถœ์‹œํ•˜๋ฉฐ ๋น„์ฆˆ๋‹ˆ์Šค๋ฅผ ํ™•์žฅํ•ด ๋‚˜๊ฐ€๋Š” ์šฐ๋ฆฌ์˜ ์„ฑ์žฅ ๋™๋ ฅ์ž…๋‹ˆ๋‹ค. ์ฟ ํŒก์˜ ๋ชจ๋“  ์ž„์ง์›์—๊ฒŒ๋Š” ๊ธฐ์—…๊ฐ€ ์ •์‹ ์„ ๊ฐ–์ถ”๊ณ  ์ƒˆ๋กœ์šด ํ˜์‹ ๊ณผ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์ถ”์ง„ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐํšŒ๊ฐ€ ์ฃผ์–ด์ง‘๋‹ˆ๋‹ค. ์ฃผ์ € ์—†์ด ์ผ์— ๋›ฐ์–ด๋“ค์–ด ์„ฑ๊ณผ๋ฅผ ์ด๋ฃจ๊ณ ์ž ํ•˜๋Š” ๊ณผ๊ฐ์„ฑ์ด, ๋ฐ”๋กœ ์ฟ ํŒก์ด ์ผํ•˜๋Š” ๋ฐฉ์‹์˜ ๋ณธ์งˆ์ž…๋‹ˆ๋‹ค. ์ฟ ํŒก์—์„œ๋Š”ย ์—ฌ๋Ÿฌ๋ถ„ ์ž์‹ , ๋™๋ฃŒ, ํŒ€ ๊ทธ๋ฆฌ๊ณ  ํšŒ์‚ฌ ์ „์ฒด๊ฐ€ ๋งค์ผ ์„ฑ์žฅํ•˜๋Š” ๋ชจ์Šต์„ ๋ชฉ๊ฒฉํ•  ๊ฒƒ์ž…๋‹ˆ๋‹ค.ย ย ย 

์ฟ ํŒก์˜ ๋ชจ๋“  ์ง์›์€ ์ปค๋จธ์Šค์˜ ๋ฏธ๋ž˜๋ฅผ ๋งŒ๋“ค๊ฒ ๋‹ค๋Š” ์ฟ ํŒก์˜ ๋ฏธ์…˜์— ์ง„์‹ฌ์ž…๋‹ˆ๋‹ค. ์šฐ๋ฆฌ๋Š” ๊ณ ๊ฐ์˜ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•ด ๋‚˜๊ฐ€๊ณ , ์ „ํ†ต์ ์ธ ๊ด€๋…๊ณผ ํ†ต๋…์— ๋งž์„œ๋ฉฐ ์‹คํ˜„ ๊ฐ€๋Šฅํ•œ ํ•œ๊ณ„๋ฅผ ๋›ฐ์–ด๋„˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ ๊ฐ€์šฉ์„ฑ (always-on) ๊ณผ ์ตœ์ฒจ๋‹จ์˜ ์•ž์„  ๊ธฐ์ˆ  (high-tech), ์ดˆ์—ฐ๊ฒฐ์‚ฌํšŒ (hyper-connected world) ์—์„œ์˜ ๋†€๋ผ์šด ์—…๋ฌด ๊ฒฝํ—˜์„ ์›ํ•˜์‹ ๋‹ค๋ฉด, ์ง€๊ธˆ ๋ฐ”๋กœ ์ฟ ํŒก์— ํ•ฉ๋ฅ˜ํ•˜์„ธ์š”.ย ย 

ย 

์ง๋ฌด ์†Œ๊ฐœย 

์ฟ ํŒก์˜ Proactive Security Team์€ Threat Actor๋กœ ์ธํ•œ ์ž ์žฌ์ ์ธ ๋ณด์•ˆ ๋ฆฌ์Šคํฌ๋ฅผ ์˜ˆ๋ฐฉํ•˜๊ฑฐ๋‚˜ ์™„ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ์‚ฌ์ „ ํ™œ๋™์„ ์ˆ˜ํ–‰ํ•จ์œผ๋กœ์จ ์ฟ ํŒก์˜ ๋ณด์•ˆ์„ ์œ ์ง€ํ•˜๋Š” ๊ฒƒ์„ ์‚ฌ๋ช…์œผ๋กœ ํ•ฉ๋‹ˆ๋‹ค.
์šฐ๋ฆฌ๋Š” ์„œ์šธ ์˜คํ”ผ์Šค์—์„œ ์ƒˆ๋กœ์šด ๊ธฐ๋Šฅ์ธ โ€œInsider Threat Counter Operation (ITCO)โ€์„ ์œ„ํ•œ ๊ธฐ์ˆ  ํŒ€์›์„ ์ฐพ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ํŒ€์€ ๋‚ด๋ถ€ ์œ„ํ˜‘ ์‹œ๋‚˜๋ฆฌ์˜ค๋ฅผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ๋ฐ์ดํ„ฐ ๊ฑฐ๋ฒ„๋„Œ์Šค ํ†ต์ œ, ๋ถ„๋ฅ˜, ๋Œ€์‘ ์—ญ๋Ÿ‰์˜ ํšจ๊ณผ๋ฅผ ํ…Œ์ŠคํŠธํ•˜๋Š” ๋ฐ ์ง‘์ค‘ํ•ฉ๋‹ˆ๋‹ค. ์„ฑ๊ณต์ ์ธ ํ›„๋ณด์ž๋Š” ๊ธฐ์ˆ ์ ์œผ๋กœ ๊นŠ์ด ์žˆ๋Š” ์—ญ๋Ÿ‰์„ ๊ฐ–์ถ”๊ณ  ์žˆ์œผ๋ฉฐ, ์œ„ํ˜‘ ํ–‰์œ„์ž ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ์บ ํŽ˜์ธ์„ ์„ฑ๊ณต์ ์œผ๋กœ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ์—ด์ •์ ์ธ ๋ถ„์ž…๋‹ˆ๋‹ค.

ย 

์—…๋ฌด ๋‚ด์šฉย 

๋‹ค์Œ์„ ํฌํ•จํ•˜๋˜ ์ด์— ๊ตญํ•œ๋˜์ง€ ์•Š๋Š” ์—…๋ฌด๋ฅผ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค;

  • ๋ฐ์ดํ„ฐ ์œ ์ถœ, ์ •์ฑ… ํšŒํ”ผ, ๊ถŒํ•œ ๋‚จ์šฉ ๋“ฑ์„ ํฌํ•จํ•œ end-to-end ์œ„ํ˜‘ ํ–‰์œ„์ž ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ์บ ํŽ˜์ธ ์ˆ˜ํ–‰
  • DLP, DSPM, legal hold ๋ฐ ๊ธฐํƒ€ ๊ธฐ์ˆ ์  ํ†ต์ œ์— ๋Œ€ํ•œ ์šด์˜ ์ˆ˜ํ–‰
  • ์œ„ ํ™œ๋™์„ ์ˆ˜ํ–‰ํ•˜๊ธฐ ์œ„ํ•œ ๋งž์ถคํ˜• ๋„๊ตฌ ๊ฐœ์„  ๋ฐ ๊ฐœ๋ฐœ
  • ์ฐธ์—ฌ ์ค‘ ๋ฐœ๊ฒฌ๋œ ๋ฌธ์ œ์— ๋Œ€ํ•œ ๊ฐœ์„  ๋ฐ ๋Œ€์‘ ๊ฐ€์ด๋“œ ์ œ๊ณต

ย 

์ž๊ฒฉย ์š”๊ฑดย 

  • Offensive operations, penetration testing ๋˜๋Š” insider threat ํ”„๋กœ๊ทธ๋žจ ๊ด€๋ จ ๊ธฐ์ˆ  ์—…๋ฌด ๊ฒฝ๋ ฅ 5๋…„ ์ด์ƒ
  • Threat Actor Attack Simulation, penetration testing ๋ฐ ์ผ๋ฐ˜์ ์ธ offensive security์— ๋Œ€ํ•œ ๊นŠ์€ ๊ธฐ์ˆ ์  ์ดํ•ด
  • ๋ณด์•ˆ ๋ฐ ๋‚ด๋ถ€ ์œ„ํ˜‘ ํŠธ๋ Œ๋“œ, ์นจํ•ด ์‚ฌ๋ก€, ๋ฐฉ์–ด ๊ธฐ์ˆ , malware์— ๋Œ€ํ•œ ์ง€์‹ ๋ฐ ๊ฒฝํ—˜
  • Cyber Kill Chain, MITRE ATT&CK ํ”„๋ ˆ์ž„์›Œํฌ์— ๋Œ€ํ•œ ์ดํ•ด ๋ฐ ์œ„ํ˜‘ ํ™˜๊ฒฝ๊ณผ์˜ ์—ฐ๊ด€์„ฑ ์ดํ•ด
  • ์‹œ๋‚˜๋ฆฌ์˜ค ๊ธฐํš ๋ฐ ์‹คํ–‰ ์‹œ ์ฐฝ์˜์ ์ด๊ณ  ๋…์ฐฝ์ ์ธ ์ ‘๊ทผ ๋ฐฉ์‹
  • ์˜์–ด ๋Šฅํ†ต

ย 

์šฐ๋Œ€ย ์‚ฌํ•ญย 

  • e-commerce ๋ถ„์•ผ์—์„œ์˜ ์—…๋ฌด ๊ฒฝํ—˜
  • ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ(AWS ๋“ฑ) ๊ฒฝํ—˜ ๋ฐ ํด๋ผ์šฐ๋“œ์™€ ์ „ํ†ต์ ์ธ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ ํ™˜๊ฒฝ ๊ฐ„์˜ ์ฐจ์ด์— ๋Œ€ํ•œ ์ดํ•ด
  • ๊ณต์ธ offensive security ์ž๊ฒฉ์ฆ ๋ณด์œ  (์˜ˆ: OSCP, OSCE, OSED, CREST, SANS ๋“ฑ)
  • ๋„๊ตฌ ๋ฐ ๊ธฐ์ˆ  ๊ฐœ๋ฐœ ๋Šฅ๋ ฅ
  • ๋น ๋ฅด๊ฒŒ ๋ณ€ํ™”ํ•˜๋Š” ํ™˜๊ฒฝ์—์„œ์˜ ์—…๋ฌด ๊ฒฝํ—˜
  • Computer Science, Computer Engineering ๋˜๋Š” ๊ด€๋ จ ๊ธฐ์ˆ  ๋ถ„์•ผ ํ•™์œ„
  • ๊ณต์ธ ๋ณด์•ˆ ์ž๊ฒฉ์ฆ ๋ณด์œ  (์˜ˆ: SANS, CREST, OSCP/OSCE ๋“ฑ)

ย 

==

Role Overview

Coupangโ€™s Proactive Security Team has a mission to keep Coupang secure by performing proactive activities that will prevent or mitigate potential security risks due to Threat Actors.

We are looking for technical team member for a new function โ€œInsider Threat Counter Operationโ€ (ITCO) in our Seoul offices. That team will simulate insider threat scenarios focused on testing the effectiveness of our data governance controls, classification, and response capabilities. The successful candidate will be someone deeply technical, passionate and able to deliver successful threat actor simulation campaigns.

ย 

What You Will Doย ย ย ย ย ย ย ย ย ย 

Responsibilities will include, but not be limited to, the following:

  • Perform end-to-end threat actor simulation campaigns including data exfiltration, policy circumvention and privilege abuse.
  • Conduct operations against DLP, DSPM, legal hold and other technical controls
  • Improve and develop customized tools to perform those activities.
  • Provide remediation guidelines and improvements to the issues identified during the engagements

ย 

Basic Qualifications

  • 5+ years of technical work experience in offensive operations, penetration testing, or insider threat programs.
  • In-depth technical understanding of Threat Actor Attack Simulation, penetration testing and offensive security in general.
  • Knowledge about and experience with security and insider threat trends, breaches and defense techniques, and malware.
  • Understanding of Cyber Kill Chain, MITRE ATT&CK framework and how those are relevant to the threat landscape.
  • โ€œOut-of-the-box" or creative approaches during the planning and execution of the scenarios.
  • Fluent in English

ย 

Preferred Qualificationsย 

  • Work experience in the e-commerce sector would be valuable.
  • Experience in cloud (e.g., AWS) and understanding the differences between Cloud and traditional data-center environments.
  • Holder of well-recognized offensive security certifications (e.g., Offensive Security like OSCP, OSCE or OSED, CREST, SANS)
  • Development skills with the ability to create or expand tools and tradecraft.
  • Experience working in a fast-paced environment.
  • Experience in cloud environments like AWS and understanding the differences between Cloud and traditional data center environments.
  • Computer Science, Computer Engineering, or related technical Degree
  • Holder of well-recognized security certifications (e.g., SANS, CREST, OSCP/OSCE,)

ย ย 

์ „ํ˜• ์ ˆ์ฐจ ๋ฐโ€ฏ์•ˆ๋‚ดโ€ฏ์‚ฌํ•ญย 

  • ์ „ํ˜•โ€ฏ์ ˆ์ฐจย 
    • ์„œ๋ฅ˜์ „ํ˜• - ์ „ํ™”๋ฉด์ ‘ - ๋Œ€๋ฉด(ํ™”์ƒ)๋ฉด์ ‘ โ€“ ์ตœ์ข… ํ•ฉ๊ฒฉ
    • ์ „ํ˜•์ ˆ์ฐจ๋Š” ์ง๋ฌด๋ณ„๋กœ ๋‹ค๋ฅด๊ฒŒ ์šด์˜๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ผ์ • ๋ฐ ์ƒํ™ฉ์— ๋”ฐ๋ผ ๋ณ€๋™๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
    • ์ „ํ˜• ์ผ์ • ๋ฐ ๊ฒฐ๊ณผ๋Š” ์ง€์›์„œ์— ๋“ฑ๋กํ•˜์‹  ์ด๋ฉ”์ผ๋กœ ๊ฐœ๋ณ„ ์•ˆ๋‚ด ๋“œ๋ฆฝ๋‹ˆ๋‹ค.ย 
  • ์ฐธ๊ณ โ€ฏ์‚ฌํ•ญย 
    • ๋ณธ ๊ณต๊ณ ๋Š” ๋ชจ์ง‘ ์™„๋ฃŒ ์‹œ ์กฐ๊ธฐ ๋งˆ๊ฐ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
    • ์ง€์›์„œ ๋‚ด์šฉ ์ค‘ ํ—ˆ์œ„์‚ฌ์‹ค์ด ์žˆ๋Š” ๊ฒฝ์šฐ์—๋Š” ํ•ฉ๊ฒฉ์ด ์ทจ์†Œ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
    • ์ทจ์—… ๋ณดํ˜ธ ๋Œ€์ƒ์ž(๋ณดํ›ˆ๋Œ€์ƒ์ž, ์žฅ์• ์ธ ๋“ฑ)๋Š” ๊ด€๋ จ ๋ฒ•๋ฅ ์— ๋”ฐ๋ผ ์ฑ„์šฉ์šฐ๋Œ€๋ฅผ ๋ฐ›์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
    • ์ง๊ธ‰๊ณผ ๋‹ด๋‹น ์—…๋ฌด ๋ฒ”์œ„๋Š” ํ›„๋ณด์ž์˜ ์ „๋ฐ˜์ ์ธ ๊ฒฝ๋ ฅ๊ณผ ๊ฒฝํ—˜ ๋“ฑ ์ œ๋ฐ˜์‚ฌ์ •์„ ๊ณ ๋ คํ•˜์—ฌ ๋ณ€๊ฒฝ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ณ€๊ฒฝ์ด ํ•„์š”ํ•  ๊ฒฝ์šฐ, ์ตœ์ข… ํ•ฉ๊ฒฉ ํ†ต์ง€ ์ „ ์ ์ ˆํ•œ ์‹œ๊ธฐ์— ํ›„๋ณด์ž์™€ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ๋  ์˜ˆ์ •์ž…๋‹ˆ๋‹ค.
    • ์ฑ„์šฉ ๋ฐ ์—…๋ฌด ์ˆ˜ํ–‰๊ณผ ๊ด€๋ จํ•˜์—ฌ ์š”๊ตฌ๋˜๋Š” ๋ฒ•๋ น์ƒ ์ž๊ฒฉ์ด ๊ฐ–์ถ”์–ด์ง€์ง€ ์•Š์€ ๊ฒฝ์šฐ ์ฑ„์šฉ์ด ์ œํ•œ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.ย 

๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ๋ฐฉ์นจโ€ฏย ย 

  • ์ฟ ํŒก ๊ทธ๋ฃน์€ ์ž…์‚ฌ์ง€์›์ž ๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ๋ฐฉ์นจ(์•„๋ž˜ ๋งํฌ)์— ๋”ฐ๋ผ ๊ท€ํ•˜์˜ ๊ฐœ์ธ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜์—ฌ ์ฒ˜๋ฆฌํ•ฉ๋‹ˆ๋‹ค.โ€ฏhttps://www.coupang.jobs/kr/privacy-policyโ€ฏย ย 

์„œ๋ฅ˜โ€ฏ๋ฐ˜ํ™˜ ์ •์ฑ…โ€ฏย ย 

  1. ๋ณธย ๊ณ ์ง€๋Š” ใ€Ž์ฑ„์šฉ์ ˆ์ฐจ์˜๊ณต์ •ํ™”์—๊ด€ํ•œ๋ฒ•๋ฅ ใ€ย ์ œ11์กฐ์ œ6ํ•ญ์— ๋”ฐ๋ฅธ ๊ฒƒ ์ž…๋‹ˆ๋‹ค.ย 
  2. ๋‹น์‚ฌ ์ฑ„์šฉ์— ์‘์‹œํ•œ ๊ตฌ์ง์ž ์ค‘ ์ตœ์ข… ํ•ฉ๊ฒฉ์ด ๋˜์ง€ ๋ชปํ•œ ๊ตฌ์ง์ž๋Š” ใ€Ž์ฑ„์šฉ์ ˆ์ฐจ์˜ ๊ณต์ •ํ™”์— ๊ด€ํ•œ ๋ฒ•๋ฅ ใ€์— ๋”ฐ๋ผ ์ œ์ถœํ•œ ์ฑ„์šฉ์„œ๋ฅ˜์˜ ๋ฐ˜ํ™˜์„ ์ฒญ๊ตฌํ•  ์ˆ˜ ์žˆ์Œ์„ ์•Œ๋ ค ๋“œ๋ฆฝ๋‹ˆ๋‹ค. ๋‹ค๋งŒ, ํ™ˆํŽ˜์ด์ง€ ๋˜๋Š” ์ „์ž์šฐํŽธ์œผ๋กœ ์ œ์ถœ๋œ ๊ฒฝ์šฐ๋‚˜ ๊ตฌ์ง์ž๊ฐ€ ๋‹น์‚ฌ์˜ ์š”๊ตฌ ์—†์ด ์ž๋ฐœ์ ์œผ๋กœ ์ œ์ถœํ•œ ๊ฒฝ์šฐ์—๋Š” ๊ทธ๋Ÿฌํ•˜์ง€ ์•„๋‹ˆํ•˜๋ฉฐ, ์ฒœ์žฌ์ง€๋ณ€์ด๋‚˜ ๊ทธ ๋ฐ–์— ๋‹น์‚ฌ์—๊ฒŒ ์ฑ…์ž„ ์—†๋Š” ์‚ฌ์œ ๋กœ ์ฑ„์šฉ์„œ๋ฅ˜๊ฐ€ ๋ฉธ์‹ค๋œ ๊ฒฝ์šฐ์—๋Š” ๋ฐ˜ํ™˜ํ•œ ๊ฒƒ์œผ๋กœ ๋ด…๋‹ˆ๋‹ค.
  3. ์œ„2ํ•ญ ๋ณธ๋ฌธ์— ๋”ฐ๋ผ ์ฑ„์šฉ ์„œ๋ฅ˜ ๋ฐ˜ํ™˜ ์ฒญ๊ตฌ๋ฅผ ํ•˜๋Š” ๊ตฌ์ง์ž๋Š” ์ฑ„์šฉ ์„œ๋ฅ˜ ๋ฐ˜ํ™˜ ์ฒญ๊ตฌ์„œ [์ฑ„์šฉ์ ˆ์ฐจ์˜ ๊ณต์ •ํ™”์— ๊ด€ํ•œ ๋ฒ•๋ฅ  ์‹œํ–‰๊ทœ์น™ ๋ณ„์ง€ ์ œ 3 ํ˜ธ ์„œ์‹]๋ฅผ ์ž‘์„ฑํ•˜์—ฌ ์ด๋ฉ”์ผ (recruitingops@coupang.com) ๋กœ ์ œ์ถœํ•˜๋ฉด, ์ œ์ถœ์ด ํ™•์ธ๋œ ๋‚ ๋กœ๋ถ€ํ„ฐ 14 ์ผ ์ด๋‚ด์— ์ง€์ •ํ•œ ์ฃผ์†Œ์ง€๋กœ ๋“ฑ๊ธฐ์šฐํŽธ์„ ํ†ตํ•˜์—ฌ ๋ฐœ์†กํ•ด ๋“œ๋ฆฝ๋‹ˆ๋‹ค. ์ด ๊ฒฝ์šฐ ๋“ฑ๊ธฐ์šฐํŽธ์š”๊ธˆ์€ ์ˆ˜์‹ ์ž ๋ถ€๋‹ด์œผ๋กœ ํ•˜๊ฒŒ ๋˜์˜ค๋‹ˆ ์œ ๋…ํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.โ€ฏย 
  4. ๋‹น์‚ฌ๋Š” ์œ„2ํ•ญ ๋ณธ๋ฌธ์— ๋”ฐ๋ฅธ ๊ตฌ์ง์ž์˜ ๋ฐ˜ํ™˜ ์ฒญ๊ตฌ์— ๋Œ€๋น„ํ•˜์—ฌ ์ฑ„์šฉ ์—ฌ๋ถ€๊ฐ€ ํ™•์ •๋œ ๋‚ ๋กœ๋ถ€ํ„ฐ 180 ์ผ๊ฐ„ ๊ตฌ์ง์ž๊ฐ€ ์ œ์ถœํ•œ ์ฑ„์šฉ์„œ๋ฅ˜ ์›๋ณธ์„ ๋ณด๊ด€ํ•˜๊ฒŒ ๋˜๋ฉฐ, ๊ทธ๋•Œ๊นŒ์ง€ ์ฑ„์šฉ์„œ๋ฅ˜์˜ ๋ฐ˜ํ™˜์„ ์ฒญ๊ตฌํ•˜์ง€ ์•„๋‹ˆํ•  ๊ฒฝ์šฐ์—๋Š” ใ€Ž๊ฐœ์ธ์ •๋ณด ๋ณดํ˜ธ๋ฒ•ใ€์— ๋”ฐ๋ผ ์ง€์ฒด ์—†์ด ์ฑ„์šฉ์„œ๋ฅ˜ ์ผ์ฒด๋ฅผ ํŒŒ๊ธฐํ•  ์˜ˆ์ •์ž…๋‹ˆ๋‹ค.
  5. ๋‹จ, ์œ„ 1ํ•ญ ๋‚ด์ง€ 4ํ•ญ์˜ ๋‚ด์šฉ์€ ๋Œ€ํ•œ๋ฏผ๊ตญ์˜ ๋…ธ๋™ ๊ด€๊ณ„ ๋ฒ•๋ น์ด ์ ์šฉ๋˜๋Š” ๊ฒฝ์šฐ์—๋งŒ ์ ์šฉ๋ฉ๋‹ˆ๋‹ค. ๊ทธ ์ด์™ธ์˜ ๊ฒฝ์šฐ์—๋Š” ์ ์šฉ๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.ย 
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index ๐Ÿ’ฐ

Job stats:  1  0  0

Tags: AWS Cloud Computer Science CREST Cyber Kill Chain DSPM E-commerce Governance Malware MITRE ATT&CK Offensive security OSCE OSCP Pentesting Privacy SANS

Region: Asia/Pacific
Country: South Korea

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.