offshore DevOps Provider to deliver a stable and secure solution. Working in big company environments with & Azure cloud area Further development of security and compliance documentation of the endpoint cloud Group Infrastructure Architecture, Cyber Security, Endpoint Security and other IT stakeholder to assess requirements
problem- and change management Handling and fixing it-security issues Software migration and agent distribution ellence QUALIFICATIONS/EXPERIENCE Degree in Information Systems or equivalent experience ITIL certification
your knowledge in the Field of Encryption and Security topics Keep documentation up to date in all relevant QUALIFICATIONS/EXPERIENCE Formal Degree in Information Systems or Information Technology or equivalent experience
solutions, the solution architects as well as the IT security environment. Dev/Ops-Engineer Platform IDPs (m/f/x) relevant documentation in the Product Depot (e.g. security documentation, functional documentation, operations of working. Troubleshooting and maintenance IT Security System Monitoring Incident and Request Management
Unit tests, Regression tests, System Integration security tests including recording of results and change tests, Integration tests and System Integration security tests NB: By applying for this role, you consent
make industrial IoT and edge computing robust, secure, and usable in production-critical environments
external providers, vendors and end-users. Treat security as a first-class citizen Work closely with stakeholders (Microsoft Azure, Amazon Web Services) Experience in securing Cloud based applications and connectivity Experience
meetings. Coordinate external contractors. Manage security vulnerabilities. NB: By applying for this role ellence QUALIFICATIONS/EXPERIENCE Degree in Information Systems or equivalent experience ITIL certification
analysis to management team to enable them to make informed decisions regarding resource management. Proactively Proactively monitor the SAP systems to ensure secure services with minimum downtime. Trouble shooting and
on time and accuracy. Ensure your systems are security compliant. Apply Pentest findings to your systems