Informatiker/in, IT-Sicherheitsspezialist/in,IT-Sicherheitsbeauftragte/r
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... disseminate advisories and deal with information security incidents, manage information security processes in the organizational units ... degree in computer science, IT security, information security or a comparable IT-related ...
... disseminate advisories and deal with information security incidents, manage information security processes in the organizational units ... degree in computer science, IT security, information security or a comparable IT-related ...
... for a full-time Deputy Information Security Officer (f m d) with ... , preferably in the field of information security, computer science, engineering or with ... Knowledge in the field of information security and the willingness to continuously ...
... for a full-time Deputy Information Security Officer (f m d) with ... , preferably in the field of information security, computer science, engineering or with ... Knowledge in the field of information security and the willingness to continuously ...
... : University degree in Computer Science, Information Systems, Computing Engineering or similar education. A minimum of 5 years’ experience in IT Infrastructure security is required plus strong technical ...
... methods, cyber security threats, trends, and best practices to enhance the effectiveness of security awareness programs. Our information security team works in collaboration with ... and influence your information security, and IT operations colleagues from ...
... application ecosystems and their unique security considerations. Design detailed security architecture patterns for AWS, focusing ... to strengthen the organisation’s security posture. Have a data-driven approach to security, with the ability to conduct ...
... implementation and maintenance of our security event monitoring toolingbuilding our security incident management and forensics capabilitiesworking ... in-house network and host security testingmanaging third-party penetration testsacting ...