... between Data Protection Officers and local IT teams, this role ensures that regulations and processes are effectively translated into technical measures. Qualifications Educational Background: A degree related to information security, cybersecurity, or a ...
de.talent.com
... Bachelor’s degree in Computer Science, Information Technology, Cyber Security, or related field. A master’s ... : Ability to analyze complex security issues, identify root causes, and recommend effective solutions. Additional Information We offer to be part ...
de.talent.com
... operating procedures. Support the Chief Information Security Officer (CISO) and Business Information Security Officers (BISOs) to integrate IT risk management into the broader information security strategy. Monitor and follow-up ...
de.talent.com
... Educational Background: Degree related to information security, cybersecurity, or relevant field. Experience: ... trends and emerging technologies in information security and cybersecurity. Additional Information We offer to be part ...
de.talent.com
... term of information security and data privacy. · Contribute to ... in Cybersecurity, Information Technology, or a related field (or equivalent experience). Minimum of 5 years of experience in Application security engineering or DevSecOps. Proven experience ...
de.talent.com
... objectives and secure that our information and digital eco-system are protected against undesired risks. You’ll hold strategic influence over security and technology decisions and therefore ...
de.talent.com
... . Deine Aufgaben Cyber Security ist Deine Expertise und Security Beratung rund um OT IoT ... entwickelst Du Cyber Security Strategien unter Berücksichtigung digitaler Trends ... ist nicht erforderlich Weitere Informationen zum Bewerbungsprozess findest Du hier. ...
de.talent.com
... : Development, implementation and maintenance of security architectures and policies Design and implementation of security information and event management (SIEM) solutions Identifying security gaps and eliminating vulnerabilities Collaboration ...
de.talent.com
... : Development, implementation and maintenance of security architectures and policies Design and implementation of security information and event management (SIEM) solutions Identifying security gaps and eliminating vulnerabilities Collaboration ...
de.talent.com
... : Development, implementation and maintenance of security architectures and policies Design and implementation of security information and event management (SIEM) solutions Identifying security gaps and eliminating vulnerabilities Collaboration ...
de.talent.com