IT Cyber & Risk Consultant, Bratislava
... DescriptionLooking to take your IT security consulting career to the next ... definitely welcome…Experience with international security projects is an advantage. Experience ...
... DescriptionLooking to take your IT security consulting career to the next ... definitely welcome…Experience with international security projects is an advantage. Experience ...
... DescriptionLooking to take your IT security consulting career to the next ... definitely welcome…Experience with international security projects is an advantage. Experience ...
... to ensuring the integrity and security of the Snowflake product and ... Snowflake while working closely with security architects, PMs, and other teams ...
... to ensuring the integrity and security of the Snowflake product and ... Snowflake while working closely with security architects, PMs, and other teams ...
... corporate systems.Provision of ICT security advice, based on the government IT Security Manual (ITSM)Physical security tasks, such as supervision of ... design and operate the cyber security tools used across the Army, ...
... guarantor of social security. We stand for life-phase- ... ) for the Information Security department The positions are conditionally ... up to information security approval and preparation of the ... subject of information security We expect a completed (specialist) ...
... as soon as possible IT SECURITY MANAGER (M F D) 100% ... cross-functional teams to implement security solutions Support development and maintenance ... recovery plans Evaluate and recommend security products and services Your Profile ...
... experiences interest in audits, IT security desk, compliance, and risk management ... well as the creation of security concepts. You are communicative, motivated, ...
... experiences interest in audits, IT security desk, compliance, and risk management ... well as the creation of security concepts. You are communicative, motivated, ...
... of information security principles, techniques and technologiesAt least ... software for security vulnerabilitiesIdentify security critical processes and componentsCreate the Security documentation like Security Report, Vulnerability assessment report, Threat ...