Informatiker/in, IT-Infrastruktur-Architekt/in, Wirtschaftsinformatiker/in, IT-Architekt/in, IT-Infrastruktur-Spezialist/in
... years) in the area of IT workstations or mobile devices or Windows operating systems or MS Active Directory or ...
... years) in the area of IT workstations or mobile devices or Windows operating systems or MS Active Directory or ...
... years) in the area of IT workstations or mobile devices or Windows operating systems or MS Active Directory or ...
... years) in the area of IT workstations or mobile devices or Windows operating systems or MS Active Directory or ...
... development of the citys IT infrastructure. Your work will not ... in the design of IT infrastructure architectures or in the implementation of solutions on on-premises systems as well as in cloud-based systems and hybrid infrastructures Result and ...
... development of the citys IT infrastructure. Your work will not ... in the design of IT infrastructure architectures or in the implementation of solutions on on-premises systems as well as in cloud-based systems and hybrid infrastructures Result and ...
... , experience in the conception of IT infrastructure architectures or in the implementation of solutions on on premises systems as well as in cloud-based systems and hybrid infrastructures. Result and ...
... , experience in the conception of IT infrastructure architectures or in the implementation of solutions on on premises systems as well as in cloud-based systems and hybrid infrastructures. Result and ...
... , experience in the conception of IT infrastructure architectures or in the implementation of solutions on on premises systems as well as in cloud-based systems and hybrid infrastructures. Result and ...
... besitzt mehrjährige Berufserfahrung mit Kontroll-Systemen und IT-GRC oder den Teildisziplinen, alternativ auch z. B. aus der IT-Revision oder dem IT-Consulting im Finanz-Umfeld; idealerweise ...
... stellen eine zeitnahe Beseitigung von IT-Sicherheitslücken sicher.Sie stellen sicher, dass IT-Systeme und IT-Anwendungen unter „best practice Sicherheitsaspekten ...