... stop to cybercrime? IT security is both your passion and ... vision on possible threats, security risks and attack vectors in ... thus make our IT security infrastructure even more secure and ... also have new IT security solutions on your radar and ...
ua.talent.com
... on the topic of information security Qualifications In-depth knowledge of information security frameworks (e.g. MARisk, BAIT, ... ) and best practices (e.g. security automation, ITIL, RiskIT, Cobit) Experience ...
ua.talent.com
... governance of the JTI’s information security strategy, which will apply to ... desirable. In-depth understanding of security frameworks (NIST, ISO 27001, etc.) ... with a proactive approach to (security) challenges. Are you ready to ...
jobs.jti.com
... or similar as IT Security Consultants (m f d) As an IT Security Consultant (m f d), you ... investigate company networks for security vulnerabilities, coordinating the course of ... in computer science, IT security, mathematics, physics or a comparable ...
ua.talent.com
... administration projects Ensuring the necessary security briefings Creation of documentation and ... profile Professional experience in the security and network environment in medium- ...
ua.talent.com
... a full-time IT security manager (f m d) for ... and evaluating operational IT security You will play a key ... a focus on IT security proven knowledge and experience in ... technical implementation of IT security measures Confident use of the ...
ua.talent.com
... Developing, implementing and monitoring IT security and IT quality assurance measures ... error states (including firewall systems, security proxies within the P-A- ...
ua.talent.com
... years full time service; Security experience: a minimum of 3 years in the security sector, and preferably with diplomatic ... ensure the safety and security of all client staff and ... are as follows: Ensuring the security of client buildings and staff ...
ua.talent.com
... monitoring of the companys cyber-security.Comply with compliance certification and ... leaks, implementation of SOC, ensuring security of End-points, etc..Ability ...
people.andersenlab.com
... (m f d) for information security ISO IEC 27001 Munich Full- ... , optimization and updating of information security policies and procedures, based on ... in the field of information security, in particular in the implementation ...
ua.talent.com