🔒 Unleashing the Ancient Power of Offline Password Generation 🔒 In today’s world of increasing cyber threats, password security has never been more critical. But what if the answer to stronger passwords lies in a method as ancient as computing itself? 💻 In my latest blog post, I dive into offline password generation, a secure, simple, and unstoppable method to protect your digital identity. No need for complex software or cloud services—just pure, unhackable passwords, generated right from your local machine. 🛡️ Learn how this old-school technique can safeguard your data in ways modern tools sometimes fail to match. 🚀 👉 Read more here: https://lnkd.in/eiyq5Bj2 🚀 You like working with the command line and on similar DevOps topics? We're hiring! If you're passionate about automation, sustainability, and developer experience, check out this exciting role: https://lnkd.in/e-FnVcsd
Lothar S.’s Post
More Relevant Posts
-
𝗡𝗲𝘄 𝗥𝗼𝗹𝗲: Censornet is hiring a Senior Developer! 𝗔𝗯𝗼𝘂𝘁 𝗖𝗲𝗻𝘀𝗼𝗿𝗻𝗲𝘁: Censornet has built an all in one platform to protect mid-market companies from Cyber threats. 𝗔𝗯𝗼𝘂𝘁 𝘁𝗵𝗲 𝗿𝗼𝗹𝗲: As our Senior Developer for the Web Security Product, you’ll take ownership of a high-performance, scalable engine that processes billions of HTTP transactions globally. You'll play a key role in applying security policies in milliseconds, with a focus on minimal latency through decentralised content scanning. 3 𝘁𝗵𝗶𝗻𝗴𝘀 𝘆𝗼𝘂 𝘄𝗶𝗹𝗹 𝘀𝗽𝗲𝗻𝗱 𝗺𝗼𝘀𝘁 𝗼𝗳 𝘆𝗼𝘂𝗿 𝘁𝗶𝗺𝗲 𝗱𝗼𝗶𝗻𝗴: 💻 Enhancing and evolving our Web Security Project ⚙️ Developing innovative new features 🚀 Optimising performance, with a focus on latency and throughput 3 𝘀𝗸𝗶𝗹𝗹𝘀 𝘁𝗵𝗮𝘁 𝘄𝗶𝗹𝗹 𝗵𝗲𝗹𝗽 𝘆𝗼𝘂 𝗲𝘅𝗰𝗲𝗹 𝗶𝗻 𝘁𝗵𝗶𝘀 𝗿𝗼𝗹𝗲: 🖥️ C Programming in a Linux environment 💡 Familiarity with C++, Python, Lua, and Rust 🌐 Strong knowledge of networking protocols and technologies 3 𝗯𝗲𝗵𝗮𝘃𝗶𝗼𝘂𝗿𝘀 𝘁𝗵𝗮𝘁 𝘄𝗶𝗹𝗹 𝗵𝗲𝗹𝗽 𝘆𝗼𝘂 𝗲𝘅𝗰𝗲𝗹 𝗶𝗻 𝘁𝗵𝗶𝘀 𝗿𝗼𝗹𝗲: 🔍 Problem-solver who takes ownership 💪 Tenacious about maximising product potential 🏁 Self-starter with drive and motivation to push boundaries 𝗙𝘂𝗿𝘁𝗵𝗲𝗿 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻: Remote Cybersecurity / SaaS / B2B ~80 Employees Series C Advert link in the comments!
To view or add a comment, sign in
-
-
Hiring security architects is broken. I know because I am trying to hire for this role for a customer. Here's what I usually see —> - security engineers who know tools but can't code - architects who think security = SQL injection - talent teams struggling to find the right fit Truth is - security architecture isn't rocket science! It needs curiosity + core engineering + these key skills 1. system design fundamentals (because security isn't an add-on) 2. threat modeling mindset (what could go wrong?) 3. coding experience (enough to review and guide) 4. business context (security should enable, not block) 5. communication (you'll work with everyone) The foundation is where you make real impact and unfortunately, that's exactly where we're missing great talent. Or, tell me what I could be doing differently? PS - if you're an architect or senior engineer interested in security - start with OWASP top 10 and secure design patterns. you'll be closer to being a security architect than you think 🎯
To view or add a comment, sign in
-
Having fun setting up BuuPass - Bus, Train & Flight bookings infrastructure to be more secure and resilient. So far no security vulnerabilities, maybe am talking too soon. Anyways with Datadog I can set up tracing, logging, metrics, security and alerts, making the platform one stop shop and a playground for any DevOps/DevSecOps engineer. Below is a weekly digest for the SIEM.
To view or add a comment, sign in
-
-
🚀 𝗪𝗲'𝗿𝗲 𝗛𝗶𝗿𝗶𝗻𝗴! 🚀 Our mission is simple yet powerful: We protect data. We're on the lookout for talented individuals to join our dynamic Product Security team. If you're ready to take on new challenges and be part of a team that's at the forefront of data protection, check out our exciting opportunities: 🔒 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁 🔒 𝗦𝗲𝗻𝗶𝗼𝗿 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿 🔒 𝗣𝗿𝗼𝗱𝘂𝗰𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗼𝗴𝗿𝗮𝗺 𝗠𝗮𝗻𝗮𝗴𝗲𝗿 I added a URL with role descriptions for all 3 positions in the first comment. Ping me if you are one of the good guys
To view or add a comment, sign in
-
-
Hey Talented Peeps! Comment below if interested
🚨 Hiring Alert: Security Analyst 🚨 Are you passionate about cybersecurity and eager to make a real impact? We are looking for a talented Security Analyst to join our team! 🔍 What You'll Do: 1. Conduct in-depth analysis of security products and identify the best fit for business needs. 2. Detect and differentiate between false positives and real vulnerabilities in applications. 3. Perform comprehensive security scans using leading tools like SAST, DAST, and SCA. 4. Lead proof-of-concept (PoC) exercises with vendors and provide hands-on testing. 5. Stay ahead of the curve by keeping up with the latest cybersecurity trends and vulnerabilities. 6. Create detailed reports and provide actionable recommendations for risk mitigation. 🎯 What We're Looking For: 1. Hands-on experience with security tools such as BurpSuite, Checkmarx, or Snyk. 2. Proficiency in programming languages like Java, Python, JavaScript, or C++. 3. Solid understanding of OWASP Top 10 vulnerabilities and mitigation strategies. 4. Analytical mindset with excellent problem-solving skills. 5. Self-driven, proactive, and a great communicator. 6. 1-3 years of experience in application security or vulnerability analysis. Ready to Secure the Future? If you're ready to take your cybersecurity career to the next level, we want to hear from you! Apply now and be a part of our mission to protect and innovate. Please share your resume at recruitease@outlook.com - - #RecruitmentServices #TalentAcquisition #HiringSolutions #CandidateScreening #JobPlacement #RecruitmentAgency #BusinessGrowth #TalentMatch #RecruitEase #EmploymentSolutions #HRConsulting #RecruitmentMadeEasy #WorkforceDevelopment #HiringExperts
To view or add a comment, sign in
-
Urgent roles for tech geek! Message Natnicha Kongmuang for further discussion
🚨 Urgent Hiring Alert! 🚨 Hi Connections, I’m currently seeking talented individuals for the following roles: 1. Senior System Engineer 💼 Salary: Up to 80K THB/month 📋 Key Responsibilities: - Design, implement, and maintain IT infrastructure, including servers and networks. - Troubleshoot and resolve system performance issues for optimal operations. - Collaborate with cross-functional teams to support infrastructure scalability and security. 2. Cyber Security Manager 💼 Salary: Up to 120K THB/month 📋 Key Responsibilities: - Develop and implement cybersecurity policies and strategies. - Monitor and respond to security incidents to ensure system protection. - Lead and manage a team of security professionals to address vulnerabilities. 3. Senior Database Administrator 💼 Salary: Up to 80K THB/month 📋 Key Responsibilities: - Manage and optimize large-scale databases for high availability and performance. - Perform database backups, recovery, and upgrades as necessary. - Provide technical expertise on database design, access, and security. 📧 Interested? Feel free to DM me or send your resume to natnicha_k@btiexecutivesearch.com. Let's connect and explore these exciting opportunities! #hiring #IT
To view or add a comment, sign in
-
Hi we're #hiring Position: AWS Expert (Multi Account Management and Security) Location: Remote Duration: 6+ Months Looking for: AWS Expert - Multi Account Management and Security Consolidate AWS accounts into a single management platform. Adhering to Samsung Cloud security policies and AWS best practices. Be able to provide and deploy a long-term strategy to manage all AWS accounts. Mandatory Skills: - AWS Expert with very good understanding of AWS Security and policies - Experience: - AWS Control Tower - AWS Organization - AWS SSO - AWS Service Control Policies - AWS IAM and Security Policies - AWS Security best Practices - CIS audit and compliance - AWS Centralized management and logging. - AWS CloudTrail. - Certification will be good to have but not mandatory. Project Deliverables Consolidate accounts into a single management platform ·Create rules and policies to govern activities in the various accounts. ·Provide or collaborate with the owning team to create templates for the secure deployment of resources in compliance with the Samsung Cloud security policies ·Fulfill requests from account owners as needed. Provide advice and guidance to optimize agility and automation. Increase Accounts Security ·Review and understand the Samsung Cloud Security Policies. ·Collaborate with account-owning teams to remediate non-compliant related issues. ·For items that cannot be remediated, provide details and information to the account owner so that an exception can be filed with Samsung Security. ·Provide and document recommendations to increase security. Provide and deploy a long-term strategy to manage all AWS account. ·Establish and document standard administrative processes. ·Build best practice documentation or templates for building new resources within AWS that fulfill the Samsung Security requirements and best practice. ·Collaborate with account owners to build templates that comply with the security policies. ·Review and establish proper user roles and privileges with the AWS accounts.
To view or add a comment, sign in
-
Where my newbies? ***I AM IN NO WAY AFFILIATED TO THIS POSITION*** I post very fresh remote roles to help my network and clients Follow me for more openings and good luck Repost to help someone in your network #hiring #jobs #entrylevel #cybersecurity #cyber #security #securityanalyst #socanalyst #cyberjobs #hiringnow #remote #soc #hiringnow #careers #job #layoff #technology
To view or add a comment, sign in
-
Hiring Security Researchers for orgs ranging from 50-1000+ employees Cloudsec, Appsec, all types of sec... Talk to me, I'm friendly :) If irrelevant, at least help me revive this dead meme and share
To view or add a comment, sign in
-
-
I'm hiring, preferably from my direct network, for two (2) - 4 month contracts to augment my team with a Sr. Security Architect and a Security Technical Program Manager. This is a very cool, but fast moving project implementing cybersecurity across an organization for a very cool project. The architect's responsibilities: - Cloud Security Design and Implementation: - Develop and enforce tailored security policies for cloud environments, maintaining tools and practices like identity management and data encryption. - Design cloud network security architectures that enhance defense strategies. - Security Observability and Monitoring: Manage observability tools to monitor security events across platforms, analyze logs for threat detection, and continually refine monitoring practices. Network Security Enhancement: - Architect and maintain secure network infrastructure, implement security measures like firewalls and IDS, and conduct regular security assessments. - Secure Application Design: - Collaborate with engineering to embed security in application development, conduct security reviews, and promote secure coding practices. - Collaboration and Leadership: Provide expert guidance and mentorship, collaborate with stakeholders for unified security strategies, and lead key security initiatives. and the STPM: Program Coordination and Management: - Oversee security program execution, aligning with strategic objectives, and coordinate resources across teams and vendors for optimal outcomes. - Monitor progress, address issues, and adapt plans to evolving requirements. Vendor and Stakeholder Engagement: - Serve as the primary liaison between internal teams and external security vendors, managing the SOC and incident response relationships effectively. - Lead regular discussions to share updates, discuss progress, and resolve conflicts. Incident Response Planning and Execution: - Develop and refine incident response plans and conduct training drills to ensure preparedness. - Direct incident response activities, ensuring efficient mitigation and communication during events. Compliance and Reporting: - Ensure security measures comply with relevant laws and standards, and manage related documentation. - Report regularly on program status and effectiveness, maintaining transparency with stakeholders. Continuous Improvement: - Solicit feedback to evaluate security measures and apply improvements strategically. - Keep abreast of industry trends to continuously advance the security strategy.
To view or add a comment, sign in