- Good technical knowledge of IT infrastructure technologies and topologies including related security technologies;
- Successfully completed... ...end customer relation;
- Service Ordering and consultancy to our customers;
- Customer & Provider Escalation...
...Computer networks administration
o Experience in web application security
o Experience in security engineering, computer and network... ...security issues
- Actively contribute to further developing of the IT Security Department in cooperation with the Team Manager and...
...working experience (auditor, business analyst or security analyst)
knowledge of data protection law (GDPR)
Experienced in IT security standards 2700x, PCIDSS
The... ...Job Description:
providing consultancy for data protection strategy and implementation...
- Studii superioare în informatic-
- Experien-- în dezvoltare software
- O bun- cunoa-tere a limbii franceze - cel pu-in nivelul B1, ideal B2.
- Participarea la analiza preliminara...
- Competen-e IT de baz- (Windows,Office);
- Studii superioare;
- Disponibilitatea de a calatori;
- Cunostinte medii limba germana... ...va rugam ca, inainte de a aplica la anuntul de angajare, sa consultati pentru informare site-ul nostru la sectiunea GDPR." Beneficii:...
...operational 'eyes on glass' real-time monitoring and analysis of security events from multiple
sources including but not limited to... ...Center, System
Administrator, Platform/Tool Support Engineer, IT Helpdesk support
- Q-Radar platform user or administrator previous...
- 4+ years experience in administering software-centric security controls in an organization
- Advanced spoken /written... ...development and quality assurance testing experience
- IT Systems: SharePoint Administration; MS SQL & IIS Administration,...
...of 2 years experience in systems administration or security operations;
Experience of working in CERT, consulting or military environments preferred;
Practical... ...vulnerability management tool and own the roadmap on its continuous improvement;
~ Deliver tangible...
LeasePlan Shared Service Center Bucharest
-University degree/diploma (e.g. in IT, business, management, economics, etc)
-Familiarity with IT Support /governance principles... ...with LPIS / HCL in order to fulfil business needs
INFORMATION SECURITY ADMINISTRATION
-Act as Information Security Administrator with...
...Global IT Security Analyst
Adecco Permanent Placement is looking for its client, world leader in digital security solutions for the mobility space, for IT Security Analyststo join their team in Bucharest.
•The holder must hold a MSc. degree or...
...Anti-virus, vulnerability scanning, penetration testing and VPN and application firewalls
~ Bachelor's Degree in Computer Science/IT Security
~2-3 years with various security technologies
~ CISSP or other IT Security certifications will be considered a plus.
They own delivery of technical areas such integration in the existing landscape of Veeam (corporate IT systems and also locally maintained systems); security standards and additional required developments like custom reports or fields hence this role is a critical...
...Microsoft Word, Excel etc. ;
Experiența în vânzarea de servicii IT pe care o considerăm un avantaj.
Descrierea jobului... ...bușilea, iar partea de creație mersul. Distribuția de produse de securitate F-Secure a fost mersul pe bicicletă. Serviciile de outsourcing IT...
We are looking for a self-propelled IT person who is eager to learn, easy to cooperate with and can speak... ...in Microsoft Office
- If you have worked as an IT support consultant or have experience with similar IT related work in the past it is...
Why should you join us? We are looking for a security technical consultant aiming at bridging the business to IT gaps and who is oriented at providing high client value services and expertise.
What we’re looking for?
...Overall Purpose of the Position
The IT Security Analyst role entails maintaining a secure enterprise environment to safeguard the Bank’s sensitive information in line with regulatory requirements and industry-wide accepted information security principles. The individual...