...top international engineers specialized in media and see your developments implemented in Tier 1 global sports and news content.... ...architecture and design reviews, vulnerability assessmen...
Job Description :
You are an OT Cyber Security Architect or would you like to become one to help protect critical systems for the security of Europe?
Then you might be right here.
The international Digital Security Architecture team is now h...
...diverse and exciting career opportunities in a dynamic work environment that stands for development and progress.
Cyber Security Analyst - Weekend + 2 Days Shift
...
...encompasses governance, risk management, and compliance (GRC) aspects, in a dynamic & technologically advanced environment.
The Director of Security, will lead the organization's information security strategy, wi...
...security services
Support security incident analysis and security response
Support coordination of delivery of security services (e.g. penetration tests)
Security related project coordination
Your profile...
...Controls, CIS, ISO27001) from the clients' Security perspective. Develop and maintain safety support material (e. g. , models,... ...Certifications (any), CEH/OSCP, CompTIA. . . We will evalu...
...of English language
Apply to our offer…
If you are passionate about technologies
If you define yourself as a team worker
If you want to work with a multidisciplinary and international team
If ...
...architecture engagement is appropriately integrated. Perform ongoing reviews of security technology standards and infrastructure (e. g. , Firewalls, IPS/IDS, Web Security, Email security, etc. ) to ensure compliance...
...requirements from business stakeholders and IT professionals to develop risk-based security solutions and servicesProvide high-level... ..., F5, Microsoft and Linux a distinct advantage. The ...
The IT Security Trainee for Global Infrastructure & Operations (GIO) will support the GIO Security team to ensure information security and compliance within the GIO scope, in line with the company’s security strategies to ensure the IT services and ...