Service Manager TI Gateway (f/d/m)
... with our customers - Creation of security concepts as well as obtaining ... based on gematiks requirements, created security concepts and accompanied audits Benefits• ...
... with our customers - Creation of security concepts as well as obtaining ... based on gematiks requirements, created security concepts and accompanied audits Benefits• ...
... Bereich Windows Betriebssysteme, Netzwerktechnik, IT-Security sowie Microsoft SQL-Datenbanken erforderlich. ... sich neue Technologien (Biometrie, Cyber Security, Cloud, Mobile Apps, IoT, AI) ...
... . Monitoring, Logging, Disaster Recovery und Security Idealerweise Erfahrung mit Linux, Kubernetes, ... schönen Campus in Aachen arbeiten. Private Arzttermine, Handwerkertermine oder ähnliches sind ...
... includes IT infrastructure, procurement, and security operations, among others. That is ... architecture diagrams * nice to have: security architecture knowledge Language requirements (according ...
... includes IT infrastructure, procurement, and security operations, among others. That is ... create architecture diagramsnice to have: security architecture knowledgeLanguage requirements (according to ...
... (m w d), in Vollzeit. Security ist nicht nur „Türsteher“. WIR ... die Nr. 1 in der Privaten Arbeitsvermittlung für Sicherheitsmitarbeiter (m w ...
... includes IT infrastructure, procurement, and security operations, among others. That is ... create architecture diagramsnice to have: security architecture knowledgeLanguage requirements (according to ...
... Bereich Windows Betriebssysteme, Netzwerktechnik, IT-Security sowie Microsoft SQL-Datenbanken erforderlich. ... sich neue Technologien (Biometrie, Cyber Security, Cloud, Mobile Apps, IoT, AI) ...
... includes IT infrastructure, procurement, and security operations, among others. That is ... topics You support the risk security, auditing and certification processes within ...
... Bereich Windows Betriebssysteme, Netzwerktechnik, IT-Security sowie Microsoft SQL-Datenbanken erforderlich. ... sich neue Technologien (Biometrie, Cyber Security, Cloud, Mobile Apps, IoT, AI) ...