Cyber Security Professional in Automotive
Help design safe software for the cars of the future.
Help design safe software for the cars of the future.
Main task is to design the safety-relevant software components.
Location: Bielefeld
Branche: Information Technology
Expertise: IT & Shared Services
Experience: 2 years
Sie sind für die Beratung, Konzeption und Umsetzung von ganzheitlichen IT-Security-Konzepten mit Schwerpunkt auf Infrastruktur und dem Perimeter-Security-Bereich verantwortlich Sie analysieren Schwachstellen in vorhandenen Strukturen und Erarbeitung von Optimierungsvorschlägen Sie bearbeiten und anaylsieren sicherheitsrelevante Ereignisse Sie sind für die Integration von IT-Security-Komponenten in bestehende heterogene Infrastrukturen zuständig Sie erarbeiten Security Prozesse und Dokumentationen sowie Konzepte und Präsentationen der Lösungen
Location: Bielefeld
Branche: Information Technology
Expertise: IT & Shared Services
Experience: 2 years
Sie wirken an Bedrohungs- und Risikoanalysen mit Sie analysieren Security Vulnerabilities Sie bewerten und wählen Security-gerechte Software-Technologien und Konzepte aus Sie unterstützen beim Design und Implementierung Security-gerechter Software in C, C++ und Java Sie stimmen sich mit unseren Entwicklern aus den Verifikationsteams ab
Location: Amsterdam
Branche: IT & Telecom
Expertise: Network, Systems, Telephony & Hardware
Experience: 2 years
Als het gaat om cyber security is tijd vaak écht geld. Soms zijn het net de kleine vulnerabilities in systemen waarin kwaadwillenden in luttele seconden toeslaan. SIEM-oplossingen moeten dit helpen voorkomen. Security Information en Event Management werkt echter niet met één druk op de knop, weet jij. Het implementeren van deze oplossingen is een zeer tijdrovende klus. Maar gelukkig wél een die de investering waard is. In het SOC (Security Operations Center) werken teams aan het bedenken, ontwikkelen en uitwerken van SIEM-oplossingen. Dag en nacht, want zo is de omgeving altijd bezet. Exploits en threats vinden namelijk maar zelden tijdens kantoortijden plaats. Overigens zet jij date sources ook zelf om naar user cases. Zodra het raakvlakken heeft met SIEM en SOC, zet jij je er eigenlijk wel voor in. Een rol in IT-veiligheid betekent ook veelzijdigheid!
Location: Doha
Branche: Conventional Energy
Expertise: Planning & Testing
Experience: 5 years
Maintenance and routine activities of the cybersecurity solutions deployed at siteCorrective MaintenancePreventive MaintenancePatch ManagementAntivirus UpdatesApplications WhitelistingNetwork MonitoringAnomaly DetectionOnline / Offline / Offsite backupFirewall rules management (add/modify/review/cleanup)Domain users’ management; Domain policy managementSystem HardeningLocal Incident Response in case of Cybersecurity IncidentInvestigate and respond to alerts from SOC.Install, configure, and maintain cyber security tools and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection solutions.Investigate security incidents and breaches, performing forensic analysis and implementing remediation actions to contain and mitigate the impact.Collaborate with internal teams and external vendors to implement security controls and measures in alignment with industry standards and best practices.Develop and maintain documentation, including standard operating procedures (SOPs), technical manuals, and incident response plans.Provide guidance and support to junior technicians on cyber security tasks and procedures.Stay abreast of emerging threats and security trends, researching and evaluating new technologies and methodologies to enhance cyber security defenses.Participate in incident response exercises and drills to test and validate cyber security incident response plans.Liaise with regulatory authorities and auditors during cyber security assessments and compliance audits.CONTRACTOR shall collaborate and work closely with OMS section. OMS are the OT Cybersecurity SMEs for Operations. The mandate OMS covers, but not limited to:ProjectsProvide advisory and support to Operations for the deployment of cybersecurity solutions, including cybersecurity scope of work definition, detailed engineering, design review, specifications review and commissioning activities (FAT, IFAT, SAT).OperationsFirst level of assurance: hygiene and hardening checks, configuration review, etc.Support assets for cybersecurity routine maintenance activities.Common ServicesBuild, deploy, and operate the centralized industrial cybersecurity services deployed within OT Common DMZ infrastructure.