Traun
1 job opening found.
Leyrer + Graf
In this role, you analyze security incidents, administer security solutions, and conduct vulnerability scans. You will also contribute to security architecture and assist with patch management.
Premedia GmbH
In this role, you analyze security risks, implement measures, and drive projects such as MFA or penetration testing to sustainably enhance IT security.
Johannes Kepler Universität
In this role, you conduct security analyses and develop IT security strategies. You monitor compliance with standards, assist in incident response, and work on security documentation.
TOMORIS GmbH
In this role, you will develop comprehensive security strategies, lead cyber defense teams, conduct risk assessments, and oversee compliance processes according to applicable standards and regulations.
In this role, you will conduct security assessments, develop IT security strategies, and implement solutions for network security and endpoint security, while monitoring compliance with security standards.
Oberbank AG
You further develop vulnerability management, oversee the entire lifecycle, analyze security tests, and implement security measures independently while communicating closely with departments.
eurofunk Kappacher GmbH
In this role, you lead the IT security department, designing security measures for complex systems while collaborating closely with internal teams and customers to ensure the highest level of information security.
ÖBB-Konzern
In this role, you will develop IT governance and compliance policies, monitor their implementation, and ensure NIS2 conformity and business continuity through targeted analyses and optimizations.
Plasser & Theurer
In this role, you analyze security policies and implement risk mitigation measures while collaborating closely with development and legal teams to ensure technical compliance in projects.
Michael Page
In this role, you will steer the information security strategy, analyze global IT systems to ensure standards and compliance, develop policies, and implement awareness measures to strengthen security consciousness.
Jobworld KG
In this role, you will be responsible for the OT security architecture, design network segmentation, implement access controls, and ensure compliance with regulatory requirements.
IVM Technical Consultants
In this role, you will develop cloud platforms on Azure, optimize processes, automate infrastructure, and enforce security policies. You will also share knowledge within the team and actively contribute to best practices.
In this role, you will manage cloud platforms, automate processes, and implement Infrastructure as Code using modern tools like Terraform. You will empower the digital infrastructure while ensuring the highest security standards and compliance.
BEKO Engineering & Informatik GmbH & Co KG
In this role, you will develop permission and role concepts using C#.NET, implement security standards, and utilize Azure Active Directory while collaborating closely with business units.
In this role, you will develop security-critical backend services for banking, optimize performance and security, and actively collaborate on the technical implementation of banking requirements and architectural decisions.
Receive new Security Job in Traun by email.
delfort
In this role, you will analyze requirements and manage permissions for SAP systems. You will further develop the FIORI landscape, design SAP Basis projects, and monitor system integrations including SAP Cloud.
In this role, you analyze requirements, manage user authorizations, and enhance the FIORI landscape. You also contribute to SAP Basis projects and oversee external service providers for system integration.
BE-terna GmbH
In this role, you will develop the IT organization, oversee IT operations, ensure IT security compliance with ISO27001, and support digital initiatives while managing processes and budgets.
In this role, you will develop security policies, monitor IT systems for risks, and coordinate incident management. You will be responsible for hybrid infrastructure and Microsoft 365 management within a dynamic team.
In this role, you analyze requirements and manage user and authorization administration. You further develop the FIORI landscape and actively contribute to the design of SAP Basis projects.
In this role, you will design and maintain user and authorization concepts, further develop the FIORI landscape, and manage monitoring systems for SAP while optimizing technical integrations.
ACP Österreich
Design and implementation of network and security infrastructure projects. Active customer contact and independent project management. Ongoing support for our clients (2nd/3rd level support). Participation in the further development of the Network &...
Design and implementation of network and security infrastructure projects based on Fortinet products. Active customer contact and independent project management. Participation in the further development of the Network & Security solution portfolio....
Internorm International GmbH
Consulting and support for internal and external stakeholders to optimize digital collaboration and implement modern Microsoft workplace solutions (TEAMS, SharePoint, CoPilot, …). Planning, implementation, and management of M365 tenants, including...
Analysis and definition of requirements as a competent technology sparring partner. Administration of user and authorization management. Further development of the FIORI landscape. Collaboration in the conception and implementation of SAP Basis...
Consulting and support for internal and external stakeholders to optimize digital collaboration and implement modern Microsoft workplace solutions (TEAMS, SharePoint, CoPilot, ...). Planning, implementation, and management of M365 tenants, including...
Design and implementation of network and security infrastructure projects. Active customer contact and independent project management. Collaboration in the further development of the network & security solution portfolio. Ongoing support of our...
sigmavista it consulting gmbh
Support in the development of IT security concepts for an internationally active group of companies Assessment of IT threat scenarios and implementation of measures Participation in the implementation of company-wide IT security solutions Continuous...
Regular risk assessments (according to ISO 27000 and BSI Grundschutz) Conducting management reviews and other information security-related meetings Introduction of new guidelines if necessary and continuous improvement of the ISMS Monitoring incidents...