PREMIUM
... an indepth understanding of Information Security and experience of writing policy, ... understanding of ISO 27001 and security requirements and controls relating to ... for you: As an Information Security Officer Informationssicherheitsbeauftragter you will earn ...
open.app.jobrapido.com
PREMIUM
... and intermittently improving our current network configuration and infrastructure. You will design our revamped network infrastructure with the goal of maximizing our network performance. You will also provide ...
open.app.jobrapido.com
... accompanied by risks to supply security.At Uniper, we consistently expand ... -term and sustainable energy supply security through the secure use of ... , in particular Application and Cloud security (MS Azure) A proven ability ...
de.talent.com
... the SABIS HQ IT Infrastructure Security teamsSetting up and configuring hardware and network components (servers, cabinets, switches, workstations, ...
de.talent.com
... for you. As a Principal Security Architect for Automotive Microcontroller in ... :Derive product requirements for the security infrastructure and all central functions ... architecture proposals.Contribute to the security architecture definition for our next ...
de.talent.com
... (m w d) für unser Security Team. Ob es um Installation, ... Systems, Fortinet, Check Point, F5 Networks, CrowdStrike, Proofpoint, Zscaler und PaloAlto Idealerweise verfügst du über einen CCNA oder CCNP Security Darüber hinaus zeichnet dich Flexibilität, ...
de.talent.com
... und Vendor Governance, Data Management, Security, sowie die Nutzung neuer Technologien ... as well as data management, security and the usage of new ... in IT audits or information security.Demonstrable experience in one or ...
de.talent.com
... , implement and enforce information security policies, procedures and guidelines to ... Business Administration, IT, information security, awareness, cyber security At least 2 years of ... stay informed on latest security trends, threads and technologies and ...
de.talent.com
... proposals. Contribute to the security architecture definition for our next ... like top-level cyber security requirements, cyber security concepts or Thread Analysis and Risk Assessment (TARA). Modeling of security from use-cases over architecture ...
de.talent.com
... other Azure services Implement security measures, data encryption and access ... or another) with your network and get the chance of ... Azure services Implement security measures, data encryption and access ... or another) with your network and get the chance of ...
de.talent.com