... of staff for the Chief Information Security Officer (CISO) position and the faculties. Decentralized Information Security Officer (m f d) (full-time part-time, permanent) The Chief Information Security Officer (CISO) is responsible for the ...
pt.talent.com
... of staff for the Chief Information Security Officer (CISO) position and the faculties. Decentralized Information Security Officer (m f d) (full-time part-time, permanent) The Chief Information Security Officer (CISO) is responsible for the ...
pt.talent.com
... soon as possible. Head of Information Security and Information Security Officer (f m d) Your main tasks You will manage the Information Security department and become an Information Security Officer. You will be responsible for ...
pt.talent.com
... soon as possible. Head of Information Security and Information Security Officer (f m d) Your main tasks You will manage the Information Security department and become an Information Security Officer. You will be responsible for ...
pt.talent.com
... soon as possible. Head of Information Security and Information Security Officer (f m d) Your main tasks You will manage the Information Security department and become an Information Security Officer. You will be responsible for ...
pt.talent.com
... for a full-time Deputy Information Security Officer (f m d) with a ... on a permanent basis. Deputy Information Security Officer (f m d) Your main ...
pt.talent.com
... for a full-time Deputy Information Security Officer (f m d) with a ... on a permanent basis. Deputy Information Security Officer (f m d) Your main ...
pt.talent.com
... : University degree in Computer Science, Information Systems, Computing Engineering or similar education. A minimum of 5 years’ experience in IT Infrastructure security is required plus strong technical ...
pt.talent.com
... methods, cyber security threats, trends, and best practices to enhance the effectiveness of security awareness programs. Our information security team works in collaboration with ... and influence your information security, and IT operations colleagues from ...
pt.talent.com
... application ecosystems and their unique security considerations. Design detailed security architecture patterns for AWS, focusing ... to strengthen the organisation’s security posture. Have a data-driven approach to security, with the ability to conduct ...
pt.talent.com