Nessus
0 job openings found.
Check the selected filters or try different search criteria.
Receive new Nessus Jobs in Upper Austria by email.
x-tention Informationstechnologie GmbH
Planning and implementation of IT security tests (penetration tests). Identification of security-relevant vulnerabilities and department of appropriate measures. Preparation of reports and support in correcting them. Further development of internal...
Planning and implementation of IT security tests (penetration tests) Identification of security-relevant vulnerabilities and department of appropriate measures Creation of reports and support in the correction of these Further development of internal...
Raiffeisen Gruppe
You are part of our Security Operations Center (SoC) and analyze log files and data with tools such as Splunk to identify potential security risks at an early stage. You carefully evaluate the results of the SoC use cases and Splunk reports and initiate...
GE Healthcare
Guidance through cybersecurity-relevant steps in the software lifecycle: Threat and risk analysis, as well as derivation of relevant measures. Support for software developers in secure implementation. Documentation and verification of security-relevant...
TÜV AUSTRIA
exciting projects for customers from all sectors such as industry, banks, insurance companies, service providers, universities, companies from the critical infrastructure Project management and cooperation with experts in independently large and...
Participation in a team of experts in independently large and medium-sized companies on the subject of cyber security Participation in research projects, also in the university environment Continuing education through participation in conferences and...
Axians ICT Austria GmbH
Advising our Austrian customers on the selection, configuration and operation of security products with the aim of repelling cyber security attacks. Evaluation of the security of systems based on security audits. Competent coordination and...
Analysis of medical devices for weak points in IT security, in particular the analysis according to Security Technical Implementation Guides Observation of published security gaps and analysis of their impact on the medical device Participation in...