The following IT risk security domains: Foundations, Identity and Access Management, Change Management, Platform Security, Operational Resilience, and Security Monitoring are among the ones you assist with the deployment of security measures. Your Profile as an IT Information Security Specialist ...
Security and Risk Management Specialist Über investify TECH Wir sind ein FinTech im Herzen von Köln und Luxemburg mit großartigen Menschen, genialer Geschäftsidee und gemeinsamem Spirit. Deine Aufgaben Als Security & Risk Management Specialist spielst du eine entscheidende Rolle in der...
Technicien Installations Mécaniques et Electroniques de Sécurité (H/F) Brink's est à la recherche de TECHNICIEN en Installations Mécaniques et Electroniques de Sécurité (H/F) Missions: Installation des équipements tel que : Menuiserie aluminium, acier, etc.Portes coulissantes Barriè...
Researching and documenting multiple information security related topics Assessing technical and functional aspects of the IT control environment Analyzing and documenting local and group wide policies and procedures Improving your personal skills: analytical, communication, writing, business pro...
Afin d'agrandir ses équipes, Brink's Security Luxembourg est à la recherche de plusieurs Hôte/Hôtesse d'accueil FR/LUX (H/F/X) : « La sécurité n'est pas qu'un métier d'hommes » Quelles seront vos missions ? Vous exercez principalement vos fonctions dans des lieux accueillant du publ...
Your role: Help Arendt build functional systems that improve customer experience and general security level of the IT&R solutions and infrastructures; Manage security infrastructure components (On premise / Cloud); Install and configure security solution components following best practice...
Afin d'agrandir ses équipes, Brink's Security Luxembourg est à la recherche de plusieurs Agent(es) de sécurité bilingues (H/F/X) avec prise de fonction immédiate : « La sécurité n'est pas qu'un métier d'hommes » Quelles seront vos missions ? Vous assurez l'accueil et le filtrage d...
Les employeurs veulent savoir
Avez-vous de l'expérience en tant que Sécurité?
You will define and implement security measures to protect them against these evolving cyber threats so as to ultimately support them in achieving their business objectives: - Define and implement information security framework including policies, processes, procedures, standards, indicators (K...
IT SECURITY OFFICER CYBER ARK SPECIALIST- GERMAN SPEAKER. Support internal IT Security officer in day-to-day tasks. ...
We are mandated by one of our clients looking for a motivated Information Security expert, able to communicate fluently in both French and in English and possesses excellent analytical skills, curiosity and precision. ...
This role requires expertise in areas such as Network Security, Identity and Access Management, Web application security, Open Standard security, and the NIST Cybersecurity Framework. Strong knowledge of security threats, risks, and controls, including but not limited to identity and authorizatio...
Development and implementation of the ISMS (Information Security Management System) documents and the Information Security risk management assessments. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), o...
Follow-up and support security controls implementation the different IT risk security domains: Foundations, Identity and Access Management, Change Management, Platform Security, Operational Resilience and Security Monitoring. At least 2 years of experience with IT Compliance programs or as Securi...
Good knowledge of implementing security in a working IT infrastructure. Some knowledge of IT security technologies, VPNs, PKI (at least knowing the theory is mandatory). ...
La connaissance du CSF NIST serait un plus .Background technique (type technique leader, architecte de sécurité) .Comprendre les architectures réseaux .Comprendre les architectures applicatives .Frameworks type OWASP Top Ten .Comprendre les approches Cloud (conception, fonctionnement de manière g...
Help build functional systems that improve customer experience and general security level of the IT&R solutions and infrastructures. Analyze logs and other data to identify, investigate and manage security threats. Manage security infrastructure components (On premise / Cloud). Install and config...
Responsable du département Sécurité des Systèmes d'Information de Santé (RSSI) (CISO - Chief Information Security Officer) (m/f). ...
The following IT risk security domains: Foundations, Identity and Access Management, Change Management, Platform Security, Operational Resilience, and Security Monitoring are among the ones you assist with the deployment of security measures. We are looking for our client located to Luxembourg an...
IT Security department of our client, a bank in Luxembourg, is searching for a. ...
Ensure that the process for security/cybersecurity risk assessments is clear, defined and followed. Conduct targeted information security risk analysis in the framework of various processus:. Conduct gap analysis between the current state of information security risks, specific risk assessments a...
Follow-up and support security controls implementation the different IT Risk security domains: Foundations, Identity and Access Management, Change Management, Platform Security, Operational Resilience and Security Monitoring;. Stay updated on emerging threats and security technologies to proactiv...
Expertise in Trusted Execution Environments (TEE), Hardware Security Modules (HSM), and network security protocols. We are seeking a highly skilled and innovative Security Architect (KMS) to join our dynamic team. The successful candidate will be responsible for designing, implementing, and testi...
Collaborate with the security team to configure and monitor alerts for suspicious activities or security incidents. Customize and implement Splunk dashboards for different stakeholders to visualize key performance indicators and security metrics. Implement security best practices within Splunk to...