PREMIUM
... requirements: · Minimum 5 years of Information Technology and 3 year of Security experience, · Foundational knowledge of all security domains and controls (ISO 27001 ... organization, e.g. the Effective Manager training series for people holding ...
www.adzuna.pl
Undisclosed Salary
... shape the future of Nordea’s information security as a member of the Technology & Security Architecture team in Group Architecture? ... blueprints for the bank’s overarching information security function. It includes documenting and ...
pl.talent.com
... shape the future of Nordea’s information security as a member of the Technology & Security Architecture team in Group Architecture? ... blueprints for the bank’s overarching information security function. It includes documenting and ...
pl.talent.com
... is required, such as Certified Information Systems Security Professional (CISSP), certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other ...
pl.jooble.org
... is required, such as Certified Information Systems Security Professional (CISSP), certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other ...
pl.talent.com
... Act as an internal information security consultant to the business and ... -solving skills, Passion for information security, Strong business acumen including written ... within key vulnerability and security information event management, functions to identify, ...
pl.jooble.org
... requirements: · Minimum 5 years of Information Technology and 3 year of Security experience, · Foundational knowledge of all security domains and controls (ISO 27001 ... organization, e.g. the Effective Manager training series for people holding ...
pl.jooble.org
... the direction of the IT Security Manager, where appropriate. Develop, implement and maintain policies, procedures and associated trainings in IT security area. Acquisition & Deployment Maintain up- ...
pl.jooble.org
... the direction of the IT Security Manager, where appropriate. Develop, implement and maintain policies, procedures and associated trainings in IT security area. Acquisition & Deployment Maintain up- ...
pl.talent.com
... a strong background in information security, excellent problem-solving abilities, and ... and authentication systems. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Incident Handler (GCIH) ...
pl.jooble.org