Information Security Design Authority (SDA) Liaison Specialist
... a strategic implementation roadmap for security technologies as necessarySupport team leadership in IT security strategic planning, risk analysis and ...
... a strategic implementation roadmap for security technologies as necessarySupport team leadership in IT security strategic planning, risk analysis and ...
... studies in the field of IT security computer science or a comparable ... the university and advise on IT security projects Coordination of requirements management ...
... studies in the field of IT security computer science or a comparable ... the university and advise on IT security projects Coordination of requirements management ...
... Source, Red Hat Enterprise Linux, IT-Betrieb, VPN, ITIL, Hardware, Linux, IT-Security, Firewalls, Konfiguration, Virtualisierung, Speichersysteme The ... requirements in the laboratory area. IT security as defined by the BSI ...
... Source, Red Hat Enterprise Linux, IT-Betrieb, VPN, ITIL, Hardware, Linux, IT-Security, Firewalls, Konfiguration, Virtualisierung, Speichersysteme The ... requirements in the laboratory area. IT security as defined by the BSI ...
... studies in the field of IT security computer science or a comparable ... the university and advise on IT security projects Coordination of requirements management ...
... studies in the field of IT security computer science or a comparable ... the university and advise on IT security projects Coordination of requirements management ...
... development of software solutions, conducting IT security certifications, and automating IT processes. YOUR PROFILE ● Cloud Technology ...
... team available & passioned for Cyber security.Required skills & profileExperience5+ year of experience in IT Security alert or IT Security incident management.Nice to have:Experience as analyst in a CyberSOC Experience in ...
... and project portfolio across all IT areas Optimization of the IT portfolio in coordination with IT strategy management, IT architecture management, IT security management, IT demand management and IT financial management Creation of joint ...