... and other relevant SAP security tools. Proven track record in ... . Participate actively in SAP security audits, implementing necessary security measures and addressing any deficiencies ... teams to implement SAP security strategies that align with business ...
customertimes.com
... range of services is IT security projects. As a consultant, you ... with a focus on IT security or comparable qualification through several ... the field of defensive IT security Technology knowledge SIEM and XDR, ...
ua.talent.com
... services Contact person for information security-related inquiries, events, reports and incidents Handling security incidents in coordination with the information security officer Administration of the IT workstations ...
ua.talent.com
... an international product company. Ajax security systems protect more than 3. ... with a strong interest in security or exposure to DevSecOps principles. ... + years of experience with AWS security stack: CloudTrail, IAM, KMS, WAF, ...
ua.talent.com
... solutions Real-time monitoring of security incidents and threats. Development and ... internal teams on improving the security infrastructure Collaboration in service and ... operating systems and network designs Security certifications (e.g. CISSP, GSOM, ...
ua.talent.com
... closely with the DSHS Information Security Officer Your profile Required are a successfully completed university degree, preferably in the field of IT security computer science Desirable are IT- ...
ua.talent.com
... or similar as IT Security Consultants (m f d) As an IT Security Consultant (m f d), you ... investigate company networks for security vulnerabilities, coordinating the course of ... in computer science, IT security, mathematics, physics or a comparable ...
ua.talent.com
... , state-of-the-art data security in the cloud with its security-of-the-cloud strategy. With ... the HR software market. IT Security Specialist (m f d) TASKS ... network firewall systems and cyber security A sense of quality and ...
ua.talent.com
... in the area of information security in cooperation with data protection ... field of computer science, IT security, IT management, IT law, business ... Great interest in IT OT security, IT Security Act 2.0, NIS 2 ...
ua.talent.com
... - guaranteed :) What you will do Security Integration : Embed security practices into CI CD pipelines ... standards; Ensure proper documentation of security policies, audit findings, and compliance ...
ua.talent.com