Information Security Engineer

W.A.G. payment solutions

W.A.G. payment solutions

IT

Prague, Czechia

Posted on Apr 22, 2026
Join our team as an IT Security Engineer and play a pivotal role in protecting our organization’s systems, data, and digital future. You’ll design and implement robust security solutions, defend against evolving threats, and collaborate across teams from IT and development to compliance and risk to embed security into everything we do. This is your opportunity to drive secure innovation, support digital transformation, and help build a strong, security-first culture across the business.
  • Proven experience in some of the following areas:
    • Security toolset maintenance
      • Implemented and maintained common security tools (scanners, SIEMs, network security devices, EDR and similar).
    • Security operations
      • Participated in security operations as any of: analyst, administrator, L2/L3 escalation point, incident responder/commander, forensics expert and similar.
    • Vulnerability management/penetration testing
      • Maintained end-to-end vulnerability management programs (tools, processes), participated in penetration tests or red/purple teaming.
    • Network security
      • Deployed, maintained or used network security devices/solutions (IDS/IPS, WAF, DDoS protection, proxies, VPNs and similar).
    • Endpoint security
      • Defined policies for endpoint security, supported remediation of violations.
    • Cloud security
      • Have done CSPM/CNAPP for any major cloud provider (AWS, GCP, Azure…)
    • Identity and access management
      • Managed MFA and SSO solutions, identity providers, privileged access monitoring, worked on RBACs, authentication mechanisms etc.
    • Security architecture and engineering
      • Participated in designing secure systems/infrastructure, embedding controls, DevSecOps.

  • OS power user, able to effectively use scripting and automation
  • Security Architecture
    • Participate in development of secure system architectures/designs
    • Integrate security controls into infrastructure and application design
  • Threat Detection & Incident Response
    • Monitor threat landscape, review attack campaigns, compile IOCs
    • Support SOC as L3 escalation point for information security incidents
  • Vulnerability Management
    • Conduct regular vulnerability assessments, penetration tests
    • Report identified vulnerabilities and provide consultations for owners in terms of remediation
  • Security Tools and Services
    • Deploy, configure, integrate and manage security solutions across the organization
    • Evaluate, PoC and recommend new security technologies
  • Compliance and Risk Management
    • Support audits and risk assessments (participation, process/tool review, artefacts)
    • Implement IT security controls as required by relevant standards/legislation
  • Security Awareness and Training
    • Contribute to the creation of security awareness trainings
    • Promote security practices within the organization via guidance/consultations
  • Development of Policies and Procedures
    • Help develop internal policies & procedures and ensure they align with regulatory requirements, business goals and security best practices