Sr. Staff Engineer Data Security Architecture L7

Seoul, South Korea

Coupang

Join us to innovate. Rocket your career. Collaborate with teams across the globe. Find your role and learn more about our culture.

View all jobs at Coupang

**Korean follows English

Internal transfer applying link: https://www.coupanginternal.jobs/

Guide link: https://coupang.service-now.com/esc?id=kb_article_view&sysparm_article=KB0010102

ย 

---

ย 

์ฒจ๋ถ€๋œโ€˜ย ์‚ฌ๋‚ด๊ณต๋ชจ์ง€์›์„œย ์–‘์‹ย โ€™์„ ์ž‘์„ฑํ•˜์‹  ํ›„ ๋ฐ˜๋“œ์‹œ ์ œ์ถœํ•˜์—ฌ ์ฃผ์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.

Please complete the attached theย ย Internal Transferย Request Formย ย and submit it.

์ฟ ํŒก ์ด๋ฉ”์ผ ๊ณ„์ •์œผ๋กœ ์ง€์›ํ•ด ์ฃผ์„ธ์š”.

Please make sure you are applying with your Coupang e-mail address.

---

Job Overviewย 

The Data Security Architect is an individual contributor in the Data Security Architect team within Security. Working with the Head of Data Security Architecture you will define the security requirements and roadmap for all data security, and work with Engineering and Platforms teams to drive adoption.

The role requires a technical expert with significant experience in large scale data security projects that can help Coupang continue to protect all our customers and partner data.

ย 

Key Responsibilities

Responsibilities will include, but not be limited to, the following:

  • Provide both strategic and technical data security architecture and implementation details across all elements of security in cloud and on-premise platforms
  • Work with Engineering teams to identify and remediate unsanctioned PII and sensitive data use in the organization
  • Participate in the Security Review process for new and changing systems during the Secure Software lifecycle
  • Partner with Data Security Engineering to build out technical solutions for visibility and control of PII and other sensitive data
  • Design and develop robust security architectures for data systems, emphasizing protection, resilience, and scalability.
  • Collaborate with cross functional teams to establish and enforce data access policies, row level security, and data masking techniques.
  • Stay abreast of the latest security trends, threats, and technologies to continually enhance our security posture.
  • Develop and maintain comprehensive documentation such as Policies, Guidelines, Standards and Designs
  • Conduct regular security assessments and audits to identify vulnerabilities and implement corrective actions in relation to data stores
  • Provide expert guidance and support to business and technical teams on all aspects of data security.

ย 

Background & Experience

  • Experience as an IC in Data Security Engineering or Data Security Architecture teams in an e-commerce or similar company
  • A deep level of technical understanding and experience in the security space, especially in securing data
  • Hands on experience in delivering DPSM commercial platforms such as BigID or similar
  • Experience securing data lakes and business analytics platforms such as PowerBi and Tableau
  • Strong knowledge of data protection laws, regulations, and standards, such as GDPR, HIPAA, and PCIDSS or local regional equivalents
  • Expertise in designing and implementing security architectures for complex data systems.
  • Experience with cloud platforms (e.g., AWS, Azure) and understanding of their respective security controls.
  • Strong knowledge of security frameworks and standards (e.g., ISO 27001, NIST)
  • Excellent problem-solving and analytical skills
  • Strong communication and interpersonal skills

ย 

--

Job Overview

๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์•„ํ‚คํ…ํŠธ๋Š” ๋ณด์•ˆ ๋‚ด ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์•„ํ‚คํ…ํŠธ ํŒ€์˜ Individual Contrbutor ์ž…๋‹ˆ๋‹ค. ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜ ์ฑ…์ž„์ž์™€ ํ˜‘๋ ฅํ•˜์—ฌ ๋ชจ๋“  ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์— ๋Œ€ํ•œ ๋ณด์•ˆ ์š”๊ตฌ ์‚ฌํ•ญ ๋ฐ ๋กœ๋“œ๋งต์„ ์ •์˜ํ•˜๊ณ  ์—”์ง€๋‹ˆ์–ด๋ง ๋ฐ ํ”Œ๋žซํผ ํŒ€๊ณผ ํ˜‘๋ ฅํ•˜์—ฌ ์ฑ„ํƒ์„ ์ด‰์ง„ํ•ฉ๋‹ˆ๋‹ค.

์ด ์—ญํ• ์—๋Š” ์ฟ ํŒก์ด ๋ชจ๋“  ๊ณ ๊ฐ ๋ฐ ํŒŒํŠธ๋„ˆ ๋ฐ์ดํ„ฐ๋ฅผ ์ง€์†์ ์œผ๋กœ ๋ณดํ˜ธํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋Š” ๋Œ€๊ทœ๋ชจ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ํ”„๋กœ์ ํŠธ์— ๋Œ€ํ•œ ํ’๋ถ€ํ•œ ๊ฒฝํ—˜์„ ๊ฐ–์ถ˜ ๊ธฐ์ˆ  ์ „๋ฌธ๊ฐ€๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.

ย 

Key Responsibilities

์ฑ…์ž„์—๋Š” ๋‹ค์Œ์ด ํฌํ•จ๋˜์ง€๋งŒ ์ด์— ๊ตญํ•œ๋˜์ง€๋Š” ์•Š์Šต๋‹ˆ๋‹ค.

  • ์ „๋žต์ , ๊ธฐ์ˆ ์  ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜์™€ ํด๋ผ์šฐ๋“œ ๋ฐ ์˜จํ”„๋ ˆ๋ฏธ์Šค ํ”Œ๋žซํผ์˜ ๋ชจ๋“  ๋ณด์•ˆ ์š”์†Œ์— ๋Œ€ํ•œ ๊ตฌํ˜„ ์„ธ๋ถ€ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
  • ์—”์ง€๋‹ˆ์–ด๋ง ํŒ€๊ณผ ํ˜‘๋ ฅํ•˜์—ฌ ์กฐ์ง์—์„œ ์Šน์ธ๋˜์ง€ ์•Š์€ PII ๋ฐ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ ์‚ฌ์šฉ์„ ์‹๋ณ„ํ•˜๊ณ  ์ˆ˜์ •ํ•ฉ๋‹ˆ๋‹ค.
  • ๋ณด์•ˆ ์†Œํ”„ํŠธ์›จ์–ด ๋ผ์ดํ”„์‚ฌ์ดํด ๋™์•ˆ ์ƒˆ๋กœ์šด ์‹œ์Šคํ…œ ๋ฐ ๋ณ€๊ฒฝ๋˜๋Š” ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ๋ณด์•ˆ ๊ฒ€ํ†  ํ”„๋กœ์„ธ์Šค์— ์ฐธ์—ฌํ•ฉ๋‹ˆ๋‹ค.
  • Data Security Engineering๊ณผ ํ˜‘๋ ฅํ•˜์—ฌ PII ๋ฐ ๊ธฐํƒ€ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ์˜ ๊ฐ€์‹œ์„ฑ ๋ฐ ์ œ์–ด๋ฅผ ์œ„ํ•œ ๊ธฐ์ˆ  ์†”๋ฃจ์…˜์„ ๊ตฌ์ถ•ํ•ฉ๋‹ˆ๋‹ค.
  • ๋ฐ์ดํ„ฐ ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜๋ฅผ ์„ค๊ณ„ํ•˜๊ณ  ๊ฐœ๋ฐœํ•˜์—ฌ ๋ณดํ˜ธ, ๋ณต์›๋ ฅ ๋ฐ ํ™•์žฅ์„ฑ์„ ๊ฐ•์กฐํ•ฉ๋‹ˆ๋‹ค.
  • ๊ต์ฐจ ๊ธฐ๋Šฅ ํŒ€๊ณผ ํ˜‘์—…ํ•˜์—ฌ ๋ฐ์ดํ„ฐ ์•ก์„ธ์Šค ์ •์ฑ…, ํ–‰ ์ˆ˜์ค€ ๋ณด์•ˆ ๋ฐ ๋ฐ์ดํ„ฐ ๋งˆ์Šคํ‚น ๊ธฐ์ˆ ์„ ์ˆ˜๋ฆฝํ•˜๊ณ  ์‹œํ–‰ํ•ฉ๋‹ˆ๋‹ค.
  • ์ตœ์‹  ๋ณด์•ˆ ๋™ํ–ฅ, ์œ„ํ˜‘ ๋ฐ ๊ธฐ์ˆ ์— ๋’ค์ฒ˜์ง€์ง€ ์•Š๋„๋ก ํ•˜์—ฌ ๋ณด์•ˆ ํƒœ์„ธ๋ฅผ ์ง€์†์ ์œผ๋กœ ๊ฐ•ํ™”ํ•ฉ๋‹ˆ๋‹ค.
  • ์ •์ฑ…, ์ง€์นจ, ํ‘œ์ค€ ๋ฐ ์„ค๊ณ„์™€ ๊ฐ™์€ ํฌ๊ด„์ ์ธ ๋ฌธ์„œ๋ฅผ ๊ฐœ๋ฐœํ•˜๊ณ  ์œ ์ง€ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค.
  • ์ •๊ธฐ์ ์ธ ๋ณด์•ˆ ํ‰๊ฐ€ ๋ฐ ๊ฐ์‚ฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜์—ฌ ์ทจ์•ฝ์„ฑ์„ ์‹๋ณ„ํ•˜๊ณ  ๋ฐ์ดํ„ฐ ์ €์žฅ์†Œ์™€ ๊ด€๋ จ๋œ ์ˆ˜์ • ์ž‘์—…์„ ๊ตฌํ˜„ํ•ฉ๋‹ˆ๋‹ค.
  • ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์˜ ๋ชจ๋“  ์ธก๋ฉด์— ๋Œ€ํ•ด ๋น„์ฆˆ๋‹ˆ์Šค ๋ฐ ๊ธฐ์ˆ  ํŒ€์— ์ „๋ฌธ์ ์ธ ์ง€์นจ๊ณผ ์ง€์›์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

ย 

Background & Experiences

  • ์ „์ž ์ƒ๊ฑฐ๋ž˜ ๋˜๋Š” ์ด์™€ ์œ ์‚ฌํ•œ ํšŒ์‚ฌ์˜ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์—”์ง€๋‹ˆ์–ด๋ง ๋˜๋Š” ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜ ํŒ€์—์„œ IC๋กœ ๊ทผ๋ฌดํ•œ ๊ฒฝํ—˜
  • ๋ณด์•ˆ ๋ถ„์•ผ, ํŠนํžˆ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์— ๋Œ€ํ•œ ์‹ฌ์ธต์ ์ธ ๊ธฐ์ˆ ์  ์ดํ•ด์™€ ๊ฒฝํ—˜
  • BigID ๋˜๋Š” ์ด์™€ ์œ ์‚ฌํ•œ DPSM ์ƒ์šฉ ํ”Œ๋žซํผ์„ ์ œ๊ณตํ•˜๋Š” ์‹ค๋ฌด ๊ฒฝํ—˜
  • ๋ฐ์ดํ„ฐ ๋ ˆ์ดํฌ ๋ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ„์„ ํ”Œ๋žซํผ(์˜ˆ: PowerBI ๋ฐ Tableau)์˜ ๋ณด์•ˆ ๊ฒฝํ—˜
  • GDPR, HIPAA ๋ฐ PCIDSS ๋˜๋Š” ์ด์— ์ƒ์‘ํ•˜๋Š” ํ˜„์ง€ ์ง€์—ญ๊ณผ ๊ฐ™์€ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ๋ฒ•๋ฅ , ๊ทœ์ • ๋ฐ ํ‘œ์ค€์— ๋Œ€ํ•œ ๊ฐ•๋ ฅํ•œ ์ง€์‹
  • ๋ณต์žกํ•œ ๋ฐ์ดํ„ฐ ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„์— ๋Œ€ํ•œ ์ „๋ฌธ ์ง€์‹.
  • ํด๋ผ์šฐ๋“œ ํ”Œ๋žซํผ(์˜ˆ: AWS, Azure)์— ๋Œ€ํ•œ ๊ฒฝํ—˜ ๋ฐ ํ•ด๋‹น ๋ณด์•ˆ ์ œ์–ด์— ๋Œ€ํ•œ ์ดํ•ด.
  • ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ ๋ฐ ํ‘œ์ค€(์˜ˆ: ISO 27001, NIST)์— ๋Œ€ํ•œ ํƒ„ํƒ„ํ•œ ์ง€์‹
  • ๋›ฐ์–ด๋‚œ ๋ฌธ์ œ ํ•ด๊ฒฐ ๋ฐ ๋ถ„์„ ๋Šฅ๋ ฅ
  • ๊ฐ•๋ ฅํ•œ ์˜์‚ฌ ์†Œํ†ต ๋ฐ ๋Œ€์ธ ๊ด€๊ณ„ ๊ธฐ์ˆ 

ย 

==

์ „ํ˜• ์ ˆ์ฐจ ๋ฐย ย ์•ˆ๋‚ดย ย ์‚ฌํ•ญ

  • ์ „ํ˜•ย ย ์ ˆ์ฐจ
    • ์„œ๋ฅ˜์ „ํ˜• - ์ „ํ™”๋ฉด์ ‘ -โ€ฏํ™”์ƒ๋ฉด์ ‘โ€ฏโ€“โ€ฏ์ตœ์ข…โ€ฏํ•ฉ๊ฒฉ
    • ์ „ํ˜•โ€ฏ์ ˆ์ฐจ๋Š”โ€ฏ์ง๋ฌด๋ณ„๋กœโ€ฏ๋‹ค๋ฅด๊ฒŒ ์šด์˜๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ผ์ • ๋ฐ ์ƒํ™ฉ์— ๋”ฐ๋ผ ๋ณ€๋™๋  ์ˆ˜โ€ฏ์žˆ์Šต๋‹ˆ๋‹ค.
    • ์ „ํ˜•โ€ฏ์ผ์ • ๋ฐ ๊ฒฐ๊ณผ๋Š” ์ง€์›์„œ์— ๋“ฑ๋กํ•˜์‹  ์ด๋ฉ”์ผ๋กœ ๊ฐœ๋ณ„์•ˆ๋‚ด๋“œ๋ฆฝ๋‹ˆ๋‹ค.
  • ์ฐธ๊ณ ย ย ์‚ฌํ•ญ
    • ๋ณธ ๊ณต๊ณ ๋Š” ๋ชจ์ง‘ ์™„๋ฃŒ ์‹œ ์กฐ๊ธฐ ๋งˆ๊ฐ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
    • ๊ณ ์šฉํ˜•ํƒœ๋Š” ์ •๊ทœ์ง์œผ๋กœ ์ˆ˜์Šต๊ธฐ๊ฐ„ 12์ฃผ๋ฅผ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.
    • ์ง€์›์„œ ๋‚ด์šฉ ๋˜๋Š” ํฌํŠธํด๋ฆฌ์˜ค์™€ ๊ด€๋ จํ•ด ํ—ˆ์œ„์‚ฌ์‹ค์ด ํ™•์ธ๋  ๊ฒฝ์šฐ์—๋Š” ํ•ฉ๊ฒฉ์ด ์ทจ์†Œ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
    • ๋ณดํ›ˆ๋Œ€์ƒ์ž ๋ฐ ์žฅ์• ์ธ ์—ฌ๋ถ€๋Š” ์ฑ„์šฉ ๊ณผ์ •์—์„œ ์–ด๋– ํ•œ ๋ถˆ์ด์ต๋„ ๋ฏธ์น˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.
    • ์ง๊ธ‰๊ณผ ๋‹ด๋‹น ์—…๋ฌด ๋ฒ”์œ„๋Š” ํ›„๋ณด์ž์˜ ์ „๋ฐ˜์ ์ธ ๊ฒฝ๋ ฅ๊ณผ ๊ฒฝํ—˜ ๋“ฑ ์ œ๋ฐ˜ ์‚ฌ์ •์„ ๊ณ ๋ คํ•˜์—ฌ ๋ณ€๊ฒฝ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ณ€๊ฒฝ์ด ํ•„์š”ํ•  ๊ฒฝ์šฐ, ์ตœ์ข… ํ•ฉ๊ฒฉ ํ†ต์ง€ ์ „ ์ ์ ˆํ•œ ์‹œ๊ธฐ์— ํ›„๋ณด์ž์™€ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ๋  ์˜ˆ์ •์ž…๋‹ˆ๋‹ค.
  • ๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ๋ฐฉ์นจย 
    • ์ฟ ํŒกโ€ฏ๊ทธ๋ฃน์€โ€ฏ์ž…์‚ฌ์ง€์›์žโ€ฏ๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ๋ฐฉ์นจ(์•„๋ž˜ ๋งํฌ)์— ๋”ฐ๋ผ ๊ท€ํ•˜์˜ ๊ฐœ์ธ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜์—ฌ ์ฒ˜๋ฆฌํ•ฉ๋‹ˆ๋‹ค.ย  https://www.coupang.jobs/kr/privacy-policy/
  • ์„œ๋ฅ˜ย ย ๋ฐ˜ํ™˜ ์ •์ฑ…ย 
    • ๋ณธ ๊ณ ์ง€๋Š” ใ€Ž์ฑ„์šฉ์ ˆ์ฐจ์˜โ€ฏ๊ณต์ •ํ™”์— ๊ด€ํ•œ ๋ฒ•๋ฅ ใ€ ์ œ11์กฐ ์ œ6ํ•ญ์— ๋”ฐ๋ฅธ ๊ฒƒ์ž…๋‹ˆ๋‹ค.
    • ๋‹น์‚ฌ ์ฑ„์šฉ์— ์‘์‹œํ•œ ๊ตฌ์ง์ž ์ค‘โ€ฏ์ตœ์ข…ํ•ฉ๊ฒฉ์ดโ€ฏ๋˜์ง€ ๋ชปํ•œ ๊ตฌ์ง์ž๋Š” ใ€Ž์ฑ„์šฉ์ ˆ์ฐจ์˜โ€ฏ๊ณต์ •ํ™”์— ๊ด€ํ•œโ€ฏ๋ฒ•๋ฅ ใ€์—โ€ฏ๋”ฐ๋ผ ์ œ์ถœํ•œโ€ฏ์ฑ„์šฉ์„œ๋ฅ˜์˜โ€ฏ๋ฐ˜ํ™˜์„ ์ฒญ๊ตฌํ•  ์ˆ˜ ์žˆ์Œ์„ ์•Œ๋ ค ๋“œ๋ฆฝ๋‹ˆ๋‹ค.โ€ฏ๋‹ค๋งŒ,โ€ฏํ™ˆํŽ˜์ด์ง€ ๋˜๋Š” ์ „์ž์šฐํŽธ์œผ๋กœ ์ œ์ถœ๋œ ๊ฒฝ์šฐ๋‚˜ ๊ตฌ์ง์ž๊ฐ€ ๋‹น์‚ฌ์˜ ์š”๊ตฌ ์—†์ด ์ž๋ฐœ์ ์œผ๋กœ ์ œ์ถœํ•œ ๊ฒฝ์šฐ์—๋Š” ๊ทธ๋Ÿฌํ•˜์ง€ ์•„๋‹ˆํ•˜๋ฉฐ,โ€ฏ์ฒœ์žฌ์ง€๋ณ€์ด๋‚˜ ๊ทธ ๋ฐ–์— ๋‹น์‚ฌ์—๊ฒŒ ์ฑ…์ž„ ์—†๋Š” ์‚ฌ์œ ๋กœโ€ฏ์ฑ„์šฉ์„œ๋ฅ˜๊ฐ€โ€ฏ๋ฉธ์‹ค๋œโ€ฏ๊ฒฝ์šฐ์—๋Š” ๋ฐ˜ํ™˜ํ•œ ๊ฒƒ์œผ๋กœ ๋ด…๋‹ˆ๋‹ค.โ€ฏย 
    • ์œ„โ€ฏ2ํ•ญ ๋ณธ๋ฌธ์— ๋”ฐ๋ผโ€ฏ์ฑ„์šฉ์„œ๋ฅ˜โ€ฏ๋ฐ˜ํ™˜ ์ฒญ๊ตฌ๋ฅผ ํ•˜๋Š” ๊ตฌ์ง์ž๋Š”โ€ฏ์ฑ„์šฉ์„œ๋ฅ˜โ€ฏ๋ฐ˜ํ™˜์ฒญ๊ตฌ์„œ[์ฑ„์šฉ์ ˆ์ฐจ์˜โ€ฏ๊ณต์ •ํ™”์— ๊ด€ํ•œ ๋ฒ•๋ฅ  ์‹œํ–‰๊ทœ์น™ ๋ณ„์ง€ ์ œ3ํ˜ธ ์„œ์‹]๋ฅผโ€ฏ์ž‘์„ฑํ•˜์—ฌ ๋‹น์‚ฌ ์ด๋ฉ”์ผ(ย recruitingops@coupang.comย )๋กœโ€ฏ์ œ์ถœํ•˜๋ฉด,โ€ฏ์ œ์ถœ์ด ํ™•์ธ๋œ ๋‚ ๋กœ๋ถ€ํ„ฐโ€ฏ14์ผ ์ด๋‚ด์— ์ง€์ •ํ•œ ์ฃผ์†Œ์ง€๋กœ ๋“ฑ๊ธฐ์šฐํŽธ์„ ํ†ตํ•˜์—ฌ ๋ฐœ์†กํ•ด ๋“œ๋ฆฝ๋‹ˆ๋‹ค.โ€ฏ์ด ๊ฒฝ์šฐ ๋“ฑ๊ธฐ์šฐํŽธ์š”๊ธˆ์€ ์ˆ˜์‹ ์ž ๋ถ€๋‹ด์œผ๋กœ ํ•˜๊ฒŒย ๋˜์˜ค๋‹ˆย ์œ ๋…ํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.โ€ฏย 
    • ๋‹น์‚ฌ๋Š” ์œ„โ€ฏ2ํ•ญ ๋ณธ๋ฌธ์— ๋”ฐ๋ฅธ ๊ตฌ์ง์ž์˜ ๋ฐ˜ํ™˜ ์ฒญ๊ตฌ์— ๋Œ€๋น„ํ•˜์—ฌ ์ฑ„์šฉ ์—ฌ๋ถ€๊ฐ€ ํ™•์ •๋œ ๋‚ ๋กœ๋ถ€ํ„ฐโ€ฏ180์ผ๊ฐ„ ๊ตฌ์ง์ž๊ฐ€ ์ œ์ถœํ•œโ€ฏ์ฑ„์šฉ์„œ๋ฅ˜โ€ฏ์›๋ณธ์„ ๋ณด๊ด€ํ•˜๊ฒŒ ๋˜๋ฉฐ,โ€ฏ๊ทธ๋•Œ๊นŒ์ง€โ€ฏ์ฑ„์šฉ์„œ๋ฅ˜์˜โ€ฏ๋ฐ˜ํ™˜์„ ์ฒญ๊ตฌํ•˜์ง€ ์•„๋‹ˆํ•  ๊ฒฝ์šฐ์—๋Š” ใ€Ž๊ฐœ์ธ์ •๋ณดโ€ฏ๋ณดํ˜ธ๋ฒ•ใ€์—โ€ฏ๋”ฐ๋ผ ์ง€์ฒด ์—†์ดโ€ฏ์ฑ„์šฉ์„œ๋ฅ˜โ€ฏ์ผ์ฒด๋ฅผ ํŒŒ๊ธฐํ•  ์˜ˆ์ •์ž…๋‹ˆ๋‹ค.ย 

ย 

ย 

Equal Opportunities for All

Coupang is an equal opportunity employer. Our unprecedented success could not be possible without the valuable inputs of our globally diverse team.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index ๐Ÿ’ฐ

Job stats:  0  0  0

Tags: Analytics Audits AWS Azure Cloud E-commerce GDPR HIPAA ISO 27001 NIST PCI DSS Privacy Security assessment Vulnerabilities

Region: Asia/Pacific
Country: South Korea

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.