IT-Sicherheitsbeauftragte/r, Informatiker/in,IT-Sicherheitsspezialist/in
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... , permanent position as Head of Information Security and Information Security Officer (f m d) with ...
... disseminate advisories and deal with information security incidents, manage information security processes in the organizational units ... degree in computer science, IT security, information security or a comparable IT-related ...
... disseminate advisories and deal with information security incidents, manage information security processes in the organizational units ... degree in computer science, IT security, information security or a comparable IT-related ...
... for a full-time Deputy Information Security Officer (f m d) with ... , preferably in the field of information security, computer science, engineering or with ... Knowledge in the field of information security and the willingness to continuously ...
... for a full-time Deputy Information Security Officer (f m d) with ... , preferably in the field of information security, computer science, engineering or with ... Knowledge in the field of information security and the willingness to continuously ...
ABOUT THE JOB:As a Security Awareness Analyst, you will promote a security first culture at TUI. You will report to TUI’s Head of Security Training and Awareness and ... with and influence your information security, and IT operations colleagues from ...
... : University degree in Computer Science, Information Systems, Computing Engineering or similar education. A minimum of 5 years’ experience in IT Infrastructure security is required plus strong technical ...
... application ecosystems and their unique security considerations. Design detailed security architecture patterns for AWS, focusing ... to strengthen the organisation’s security posture. Have a data-driven approach to security, with the ability to conduct ...