... Background: A degree related to information security, cybersecurity, or a relevant field ... trends and emerging technologies in information security and cybersecurity. Additional Information We offer to be part ...
de.talent.com
... local entity to align the information security strategy with our business strategy ... actively to the local national Information Security community. In case of a ... guidelines and requirements related to Information Security; Plan and coordinate the execution ...
de.talent.com
... .0) with a focus on information security. Identify malware types, infection methods, ... , Lucene, and RegEx Certifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar. Incident ...
de.talent.com
... .0) with a focus on information security. Identify malware types, infection methods, ... , Lucene, and RegEx Certifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar. Incident ...
de.talent.com
... Bachelor’s degree in Computer Science, Information Technology, Cyber Security, or related field. A master’s ... : Ability to analyze complex security issues, identify root causes, and recommend effective solutions. Additional Information We offer to be part ...
de.talent.com
... security engineers responsible for designing, implementing, and maintaining security controls across the organization. Threat ... science, Information Security, or a related field. Proven experience in security architecture and engineering leadership roles. ...
de.talent.com
... Educational Background: Degree related to information security, cybersecurity, or relevant field. Experience: ... trends and emerging technologies in information security and cybersecurity. Additional Information What we offer: To be ...
de.talent.com
... individual should have profound professional senior experience in information technology, Cyber security as well as experience with security in agile ways of working, ...
de.talent.com
... lifecycle (SDLC) used by software engineers across METRO is following best practices in term of information security and data privacy. · Contribute to ...
de.talent.com
... IT and information security risks within METRO AG and ... the Chief Information Security Officer (CISO) and Business Information Security Officers (BISOs) to integrate IT risk management into the broader information security strategy. Monitor and follow-up ...
de.talent.com