ä¿ëÁ¤º¸
ÀÎÀç°Ë»ö
±³À°Á¤º¸
ÇìµåÇåÆÃ
¾Æ¸£¹ÙÀÌÆ®
½º¸¶Æ®Å¸¿î
ȸ¿ø¼­ºñ½º
À̷¼­ µî·Ï
ä¿ë°ø°í µî·Ï
¾÷/Á÷Á¾º° ä¿ëÁ¤º¸ ÇìµåÇåÆÃ ¾÷/Á÷Á¾º° ä¿ëÁ¤º¸
IT¡¤°ÔÀÓ >
ÃÑ °ÇÀÌ °Ë»ö µÇ¾ú½À´Ï´Ù.
Çз    ¹«°üÆ÷ÇÔ
°æ·Â ³â ~ ³â  ½ÅÀÔ ¹«°üÆ÷ÇÔ
±Ù¹«ÇüÅÂ
±â¾÷ÇüÅÂ
Ű¿öµå °Ë»ö
ÀÏ¹Ý Ã¤¿ëÁ¤º¸ Àüüº¸±â ¾Æ·¡ Ç׸ñÀ» Ŭ¸¯ÇϽøé ä¿ëÁ¤º¸¸¦ Á¤·ÄÇØ¼­ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
µî·ÏÀÏ È¸»ç¸í ¸ðÁý³»¿ë °æ·ÂÁ¶°Ç Çз ¸¶°¨ÀÏ
04/25 HENNY&MCCOY ±Û·Î¹ú ¼ÒºñÀç - Information Security Analy.. »õâ
Á¤±ÔÁ÷¤Ó¸éÁ¢½ÃÇùÀǤӼ­¿ï
8³âÀÌ»ó ¹«°ü ä¿ë½Ã
ÆÄÀÏÀ̷¼­ °ü¸® ä¿ëÁ¤º¸ ¾Ë¸®¹Ì ÀÎÀû¼º°Ë»ç