... .0) with a focus on information security. Identify malware types, infection methods, ... , Lucene, and RegEx Certifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar. Incident ...
de.talent.com
... .0) with a focus on information security. Identify malware types, infection methods, ... , Lucene, and RegEx Certifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar. Incident ...
de.talent.com
... and Access Management), DevSecOps, Endpoint Security, SIEM (Security Information and Event Management). Machine Identity ... and Access Management), DevSecOps, Endpoint Security, SIEM (Security Information and Event Management) - idealerweise bei ...
de.talent.com
... IT and information security risks within METRO AG and ... the Chief Information Security Officer (CISO) and Business Information Security Officers (BISOs) to integrate IT risk management into the broader information security strategy. Monitor and follow-up ...
de.talent.com
... the German Federal Office for Information Security (BSI), in particular the IT ... laws in the field of information security as well as the GDPR, ... with ZIM employees and the information security organization Supporting the introduction of ...
de.talent.com
... the German Federal Office for Information Security (BSI), in particular the IT ... laws in the field of information security as well as the GDPR, ... with ZIM employees and the information security organization Supporting the introduction of ...
de.talent.com
... the German Federal Office for Information Security (BSI), in particular the IT ... laws in the field of information security as well as the GDPR, ... with ZIM employees and the information security organization Supporting the introduction of ...
de.talent.com
... years of experience in IT security, including 3 years in a ... solid reputation in the IT security field.Communication Skills: Ability to ... Consulting, we develop sustainable IT security concepts that make companies more ...
de.talent.com
... objectives and secure that our information and digital eco-system are protected against undesired risks. You’ll hold strategic influence over security and technology decisions and therefore ...
de.talent.com
... : Development, implementation and maintenance of security architectures and policies Design and implementation of security information and event management (SIEM) solutions Identifying security gaps and eliminating vulnerabilities Collaboration ...
de.talent.com