... for one of their cyber security programmes. This is a B2B ... and function and enhancing the security and integrity of key internal ... with other engineering and cyber security teams to ensure IAM processes ...
cz.talent.com
... environment•Leading a team of security consultants•Participate in planning tasks • ... Qualifications•General awareness of Cyber security and Information security processes and architecture•SIEM platform ...
cz.talent.com
:Maintain and configure our software security toolchain.Perform application security scans using SAST and DAST ... .Provide metrics and reporting on security tool adoption and risks.Requirements: ...
cz.talent.com
... ? Are you interested in developing security services and making them even ... the essentials of network and security fundamentals such as TCP IP, ... detail as required in developing security-related applications Be open and ...
cz.talent.com
... digitalization, IT services and IT security at the university. We are ... level with regard to IT security, digitalization and strategic cooperation Your ...
cz.talent.com
... and automation solutions meet IT security standards and compliance requirements Implement security measures, monitor security incidents and work closely with the IT Security Officer Ensuring a smooth integration ...
cz.talent.com
... the management and the various security functions such as Controlling, Business Continuity Management, Information Security, etc. in the ENTEGA Group ... of risk management or information security or alternatively a comparable qualification ...
cz.talent.com
... the laboratory area. IT security as defined by the BSI ... meet? Knowledge of information security (BSI) in a regulatory environment ... to an extended security check in accordance with Section 9 of the German Federal Security Check Act (SÜG). What do ...
cz.talent.com
... a balance of security and performance; Investigate security incidents and instigate remedial measures ... experience as an information security engineer analyst; Strong investigative and ... expertise in cloud security, telemetry, and attack techniques; Strong ...
cz.talent.com
... the areas of LAN WLAN, security (firewall, endpoint, etc.), virtualization, storage, ... in the development of IT security solution concepts based on different information and IT security requirements You have an independent ...
cz.talent.com