Information Security Consultant

Odpovědět

Job description:Assessment and preparation of statements and reports to solutions, products and services in terms of information securityDesign, analysis, and documentation solution in terms of information securityLeadership / cooperation on internal / customer projects in the field of information security; definition of ISMS implementation process; definition, implementation of IT solutions and products; quality assuranceParticipation on internal and external ISMS and PCI DSS auditsPCI DSS consulting and audit reportingVulnerability management and testing of application and systemPreparing reports, summaries, and recommendations related to vulnerabilities and penetration testing resultsInternational reliable and successful company.Friendly team, moderne environment.Mobile phone, notebook.5 weeks of holidays.Meal vouchers.Opencard.Contribution to the pension fund.CoursesAbility to work independently, self-management projectsGood communication skillsExperience in IT consulting services, particularly ISMS processesExperience in performing audits of information securityExperience with the preparation of commercial offers Presale presentationsExperience with modeling and implementation of ISMS processesExperience in the fields of cryptographyExperience in vulnerability management and penetration testingKnowledge of technologies authentication, PKIOrientation in Information securityAdvantageExperience with the implementation of ISO27001 Job description:Assessment and preparation of statements and reports to solutions, products and services in terms of information securityDesign, analysis, and documentation solution in terms of information securityLeadership / cooperation on internal / customer projects in the field of information security; definition of ISMS implementation process; definition, implementation of IT solutions and products; quality assuranceParticipation on internal and external ISMS and PCI DSS auditsPCI DSS consulting and audit reportingVulnerability management and testing of application and systemPreparing reports, summaries, and recommendations related to vulnerabilities and penetration testing results

Alza.cz Stringdata BTL Trask CRAW