... IT and information security risks within METRO AG and ... the Chief Information Security Officer (CISO) and Business Information Security Officers (BISOs) to integrate IT risk management into the broader information security strategy. Monitor and follow-up ...
de.talent.com
... objectives and secure that our information and digital eco-system are protected against undesired risks. You’ll hold strategic influence over security and technology decisions and therefore ...
de.talent.com
... role. Advanced knowledge of Microsoft security solutions (Azure, O365). At least one recognized information security certification (e.g., CompTIA, Cisco, ...
de.talent.com
... customers strengthen and simplify their security posture Present to customers as our expert at all levels in the ... , gender identity or expression, genetic information, marital status, medical condition, national ...
de.talent.com
... customers strengthen and simplify their security posture Present to customers as our expert at all levels in the ... , gender identity or expression, genetic information, marital status, medical condition, national ...
de.talent.com
... and information security requirements. You will be part ... in utilizing Security Operations Center (SOC) tools and technologies, including SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), ...
de.talent.com
... solution design Improve the data security engineering process as well as data security by design concept Requirements Currently enrolled as Master Student in Computer Science, Information Technology, Cybersecurity, Electrical Engineering, or ...
de.talent.com
... are looking for a: Technical Expert (m f d) with knowledge ... 5. However, there is an Information Security Guideline and Polices that need ... mission-critical applications and sensitive information ? Development of gap analysis: Identification ...
de.talent.com
... meet an appropriate technology security level, and demonstrate that all ... have ability to communicate security requirements and risks to all ... have profound professional experience in information technology and Cyber security with special focus on mobile ...
de.talent.com
... in AWS & Azure mit Fokus Security Erfahrung mit Security Standards, Normen & Gesetzen (z. B. ... ) Erfahrung mit CSPM (Cloud Security Posture Management) Tools (z.B. ... weitere tolle Benefits Z usätzliche Informationen Die ZGD unterstützt in Abhängigkeit ...
de.talent.com