Cyber Security Consultant, CISSP, SIEM, Data Sec.
- Verfügbarkeit einsehen
- 0 Referenzen
- 80€/Stunde
- 84339 Unterdietfurt
- DACH-Region
- ro | de | en
- 14.10.2024
Kurzvorstellung
International erfahrener, zweifach ISC2 CISSP- und CC-zertifizierter Cybersecurity-Ingenieur, hochqualifiziert im Bereich Cybersecurity vor und nach dem Verkauf, mit umfassenden Geschäftskenntnissen.
Qualifikationen
Weitere Kenntnisse
Security and Risk Management,
Asset Security,
Security Architecture and Engineering,
Communication and Network Security,
Identity and Access Management (IAM),
Security Assessment Testing,
Security Operations,
Software Development Security,
customer relations
organisational resilience
execute ICT audits
identify ICT security risks
ICT security standards
educate on data confidentiality
report test findings
analyse ICT system
keep task records
ICT security legislation
define security policies
develop information security strategy
identify ICT system weaknesses
monitor system performance
define technical requirements
implement ICT risk management
manage disaster recovery plans
manage IT security compliances
verify formal ICT specifications
execute software tests
provide ICT consulting advice
perform risk analysis
information security strategy
cyber attack counter-measures
keep up with the latest information systems solutions
Lean project management
provide user documentation
Process-based management
ICT process quality models
perform project management
ICT project management methodologies
lead disaster recovery exercises
give live presentation
manage ICT change request process
internet governance
manage changes in ICT system
copyright legislation
Internet of Things
ICT encryption
track key performance indicators
optimise choice of ICT solution
lead disaster recovery exercises
develop contingency plans for emergencies
comply with legal regulations
analyse business processes
internal risk management policy
implement ICT recovery system
system backup best practice
implement ICT risk management
organisational resilience
manage disaster recovery plans
develop information security strategy
perform security vulnerability assessments
manage IT security compliances
cyber security
manage system security
ICT recovery techniques
identify ICT security risks
analyse the context of an organisation
execute ICT audits
ICT process quality models
business process modelling
apply procurement
define security policies
train employees
perform project management
manage budgets
coordinate technological activities
ICT system user requirements
human-computer interaction
ICT network security risks
analyse business requirements
advise on strengthening security
build business relationships
provide cost benefit analysis reports
maintain ICT system
manage changes in ICT system
solve ICT system problems
ICT system programming
quality assurance methodologies
monitor system performance
implement ICT recovery system
support ICT system users
ICT system user requirements
ICT infrastructure
perform backups
integrate system components
apply ICT system usage policies
software components libraries
administer ICT system
apply system organisational policies
provide technical documentation
interpret technical texts
manage system security
migrate existing data
hardware components
manage system testing
organisational policies
systems development life-cycle
interfacing techniques
engineering processes
internet governance
implement ICT risk management
adjust ICT system capacity
ICT recovery techniques
acquire system component
provide ICT system training
information security strategy
interact with users to gather requirements
use different communication channels
Asset Security,
Security Architecture and Engineering,
Communication and Network Security,
Identity and Access Management (IAM),
Security Assessment Testing,
Security Operations,
Software Development Security,
customer relations
organisational resilience
execute ICT audits
identify ICT security risks
ICT security standards
educate on data confidentiality
report test findings
analyse ICT system
keep task records
ICT security legislation
define security policies
develop information security strategy
identify ICT system weaknesses
monitor system performance
define technical requirements
implement ICT risk management
manage disaster recovery plans
manage IT security compliances
verify formal ICT specifications
execute software tests
provide ICT consulting advice
perform risk analysis
information security strategy
cyber attack counter-measures
keep up with the latest information systems solutions
Lean project management
provide user documentation
Process-based management
ICT process quality models
perform project management
ICT project management methodologies
lead disaster recovery exercises
give live presentation
manage ICT change request process
internet governance
manage changes in ICT system
copyright legislation
Internet of Things
ICT encryption
track key performance indicators
optimise choice of ICT solution
lead disaster recovery exercises
develop contingency plans for emergencies
comply with legal regulations
analyse business processes
internal risk management policy
implement ICT recovery system
system backup best practice
implement ICT risk management
organisational resilience
manage disaster recovery plans
develop information security strategy
perform security vulnerability assessments
manage IT security compliances
cyber security
manage system security
ICT recovery techniques
identify ICT security risks
analyse the context of an organisation
execute ICT audits
ICT process quality models
business process modelling
apply procurement
define security policies
train employees
perform project management
manage budgets
coordinate technological activities
ICT system user requirements
human-computer interaction
ICT network security risks
analyse business requirements
advise on strengthening security
build business relationships
provide cost benefit analysis reports
maintain ICT system
manage changes in ICT system
solve ICT system problems
ICT system programming
quality assurance methodologies
monitor system performance
implement ICT recovery system
support ICT system users
ICT system user requirements
ICT infrastructure
perform backups
integrate system components
apply ICT system usage policies
software components libraries
administer ICT system
apply system organisational policies
provide technical documentation
interpret technical texts
manage system security
migrate existing data
hardware components
manage system testing
organisational policies
systems development life-cycle
interfacing techniques
engineering processes
internet governance
implement ICT risk management
adjust ICT system capacity
ICT recovery techniques
acquire system component
provide ICT system training
information security strategy
interact with users to gather requirements
use different communication channels
Persönliche Daten
Sprache
- Rumänisch (Muttersprache)
- Deutsch (Fließend)
- Englisch (Fließend)
Reisebereitschaft
DACH-Region
Arbeitserlaubnis
- Europäische Union
- Schweiz
Home-Office
bevorzugt
Profilaufrufe
32
Alter
43
Berufserfahrung
19 Jahre
(seit 11/2005)
Projektleitung
6 Jahre
Kontaktdaten
Nur registrierte PREMIUM-Mitglieder von freelance.de können Kontaktdaten einsehen.
Jetzt Mitglied werden