Cloud Security Engineer (雲端資安工程師)
Taipei, TP, Taiwan
Logicalis
Elevate your business with Logicalis, the top IT solutions and managed services provider in Australia. Explore our offerings and start your journey to success!Why choose Logicalis?
As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.
We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.
Function Description:
• Designs, develops, implements and troubleshoots various information system (IS) and cyber security software
• Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems
• Evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation
• Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities
Career Type Description:
• Designs, develops, implements and troubleshoots various information system (IS) and cyber security software
• Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems
• Evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation
• Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities
Profile Description:
• Has working knowledge and experience in own discipline
• Continues to build knowledge of the organization, processes and customers
• Performs a range of mainly straightforward assignments
• Uses prescribed guidelines or policies to analyze and resolve problems
• Receives a moderate level of guidance and direction
•• Has limited work experience involving basic concepts and procedures
•• Develops competence by performing structured work assignments
•• Uses existing procedures to solve routine or standard problems
•• Works under supervision and direction from more senior level roles
Career: IT Security-Cyber Security
Career Type: Professional
Job Type: Analyst
Level: P09
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Cloud Compliance Ethical hacking Firewalls Governance Intrusion detection IoT Risk assessment Scripting Security assessment SQL SQL injection Vulnerabilities XSS
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.