IT Project Manager
... field of cybersecurity, especially in security infrastructure. You should be familiar ... , identity management, cloud and IoT security, threat detection and response, network security, etc. WHAT DO WE OFFER? ...
... field of cybersecurity, especially in security infrastructure. You should be familiar ... , identity management, cloud and IoT security, threat detection and response, network security, etc. WHAT DO WE OFFER? ...
... . Zum Aufbau unseres Security Operation Center Teams am Standort ... im Bereich Cyber Security wie z.B. Cisco Certified CyberOps Associate, CCNP Security, EC-Council Certified SOC Analyst (CSA) oder CompTIA Security+ Gutes Deutsch und Englisch, beides ...
... Cyber Authorities, etc. * Support the Security of the ecosystem companies to harmonize Schneider Electrics security posture and execute the cybersecurity ... requests and assessments. * Support information security and cyber audits and certifications ( ...
... Cyber Authorities, etc. * Support the Security of the ecosystem companies to harmonize Schneider Electrics security posture and execute the cybersecurity ... requests and assessments. * Support information security and cyber audits and certifications ( ...
... state-of-the-art data security in the cloud with its security-of-the-cloud strategy. With ... the further development of IT security solutions and data backup Collaboration ... Collaboration in the Information Security Management System (ISMS) according to ...
... state-of-the-art data security in the cloud with its security-of-the-cloud strategy. With ... the further development of IT security solutions and data backup Collaboration ... Collaboration in the Information Security Management System (ISMS) according to ...
... state-of-the-art data security in the cloud with its security-of-the-cloud strategy. With ... the further development of IT security solutions and data backup Collaboration ... Collaboration in the Information Security Management System (ISMS) according to ...
... für die Implementierungen auf unserem Security-Environment (auf Basis der Micrsosoft Security Produkten) bis zum fertigen Use ... Basis von Anwendungs-, Systemen- oder Security Protokollen und hilfst unsere SIEM ...
... bei konzeptionellen Designfragen von Security-Lösungen Bei Bedarf installierst und implementierst du Security-Lösungen Vorort Du berätst unsere ... Informatik) Idealerweise erste Berufserfahrungen im Security und Data-Center-Umfeld Kenntnisse ...
... on non-technical subjects. Security Requirements: Individuals with an active TOP SECRET security clearance with SCI access All ... obtain a TOP SECRET security clearance with SCI access U. ... applicants with active security clearances, recent CI interviews, and ...