INFORMATION SECURITY SPECIALISTS

THE IT SECURITY EXPERTS
A rapidly growing area. Increasing cyber crime requires more and more experts.

INFORMATION SECURITY SPECIALISTS

TYPICAL POSITIONS:
  • Information Security Specialist
  • Security Specialist
  • Senior Security Specialist
  • Security Engineer
A third-party attack - whether it's about doing damage toengage in industrial espionage or with fraudulent intent- In addition to having a direct impact on the economic stability of a company, it can also have indirect consequences, such as damage to its image. Increasing IT security is therefore a key factor for the long-term success of a company.

The increasing number of security breaches and the associated risk of identity thefthave increased the protection of data in business and government areas. Information security analysts help defend a company's computer network and systems. You plan and implement various security measures, e.g. B. the installation and use of software and the simulation of cyber attacks to test systems. Information security jobs are expected to grow well above average with a 28% increase between 2016 and 2026.

POPULAR EMPLOYERS (A-Z):

  • 8MAN
  • Accenture
  • AdNovum
  • Atos
  • Atos/Evidian
  • Avast
  • AVG
  • Avira
  • Axians
  • BAE Systems
  • baramundi
  • Barracuda
  • Bechtle
  • Beta Systems
  • Bitdefender
  • Brainloop
  • BT
  • CA
  • CANCOM
  • Capgemini
  • CGI
  • Check Point
  • Cisco
  • Citrix
  • Clearswift
  • CoSoSys
  • Cognizant
  • COMPAREX
  • Computacenter
  • Controlware
  • Data-Warehouse
  • DELL
  • DeviceLock
  • Digital Guardian
  • Dimension Data (NTT)
  • DriveLock
  • DXC Technology
  • econet
  • ESET
  • FireEye
  • FIT
  • Forcepoint
  • Fortinet
  • F-Secure
  • Fujitsu
  • G Data
  • GBS
  • Huawei
  • IBM
  • IBV (digitronic)
  • itWatch
  • Juniper
  • Kaspersky
  • LogRhythm
  • Matrix42
  • Matrix42/EgoSecure
  • McAfee
  • McAfee/Skyhigh
  • Micro Focus
  • Microsoft
  • MobileIron
  • Netskope
  • Nexus
  • NTT Security
  • Okta
  • Palo Alto
  • Panda Security
  • Ping Identity
  • Proofpoint
  • QSC
  • Rohde & Schwarz Cybersecurity
  • SecureWorks
  • SonicWall
  • Sophos
  • Splunk
  • Symantec
  • Telekom Deutschland
  • Trend Micro
  • Trustwave
  • T-Systems
  • Verizon
  • WatchGuard
  • Webroot
  • Wipro
  • Zscaler
Share by: