[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"project-implementierungsberater-fuer-it-sicherheit":3,"similar-implementierungsberater-fuer-it-sicherheit":44},{"id":4,"slug":5,"title":6,"skills":7,"budget":28,"duration":29,"location":30,"onsitePercent":31,"contractType":32,"foundAt":33,"category":34,"description":38,"rawText":39,"webTitle":6,"webText":40,"language":41,"projectId":42,"sourceUrl":43},5635,"implementierungsberater-fuer-it-sicherheit","Implementierungsberater für IT-Sicherheit",[8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27],"IT-Security Beratung","Anforderungsanalyse","Datenmodellierung","Wallix","Cyber Ark","MS Projects","Scrum","Security Monitoring","Splunk","Identity & Access Management","Omada Identity","Active Directory","Vulnerability Management","Tenable","Firewalls","Fortigate","Cisco","Checkpoint","Privileged Access Management","PowerDesigner",null,"12 Monate +","Frankfurt",100,"contracting","2026-05-22T16:30:43+00:00",{"id":35,"slug":36,"label":37},5,"it_infra_security","IT-Infrastruktur & Security","Implementierung und Beratung im IT-Sicherheitsbereich mit Fokus auf Anforderungsanalyse, Customizing und technische Umsetzung. Erfahrung mit Wallix Software und verschiedenen Security-Bereichen erforderlich.","Wir sind aktuell für unseren Vertragskunden auf der Suche nach einem Implementierungsberater für IT-Sicherheit zu einer Auslastung von 100% vor Ort in Frankfurt.\n\nIhre Aufgaben:\n\n+ Erfassung und Aufbereitung von funktionalen und nicht-funktionalen Anforderungen durch geeignete Modelle (z.B. Workshops, Interviews).\n\n+ IT-Analyse, Management, Dokumentation sowie Überführung der für das Projekt erforderliche fachlichen und regulatorischen Anforderungen \n\n+ Customizing in den vom Kunden eingesetzten Systemen im IT-Sicherheitskontext\n\n+ Begleitung der IT-Umsetzungen der fachlich definierten Anforderungen\n\n+ Entsprechende technische Implementierung (Wallix Software)\n\n+ Vorbereitung, Durchführung und Dokumentation der entsprechenden fachlichen Abnahmetests\n\n+ Vorbereitung und Beratung beim Rollout der entsprechenden IT-Systemen und\u002Foder Änderungen an diesen\n\n+ Erstellung der Anwendungs-Dokumentation (z.B. im PowerDesigner)\n\n Anforderungen: \n Must-Haves:\n\n+ 5 Jahre Erfahrung in der IT-Security Beratung\n\n+ Erfahrung im Bereich Anforderungsanalyse (Identifikation, -strukturierung und -aufbereitung)\n\n+ Erfahrung mit fachlicher Datenmodellierung\n\n+ Erfahrung mit strukturierter Dokumentation \n\n+ Erfahrung mit Wallix (alternativ Cyber Ark oder ähnlich)\n\n+ Projekterfahrung oder Zertifizierungen in MS Projects, Scrum\n\n+ Sehr gute fachliche Skills in mehreren der folgenden Bereiche:\n\n-> Security Monitoring und Security Incident Management (vorzugsweise Splunk)\n\n-> Identity & Access Management (vorzugsweise Omada Identity, Active Directory)\n\n-> Vulnerability Management (z.B. Tenable)\n\n-> Firewalls (vorzugsweise Fortigate, Cisco, Checkpoint)\n\n-> Privileged Access Management (PAM)\n\n Zusätzliche Informationen: \n Konnten wir Ihr Interesse wecken? Dann freuen wir uns auf die Zusendung Ihres aussagekräftigen Expertenprofils unter Angabe Ihrer Stundensatzvorstellung. \n\n Projekt-Nr.: \n106080\n\nStellentyp: \nfreiberuflich\n\nEinsatzort: \nD6\n\nStart: \n06.07.2026\n\nDauer: \n12 Monate +","Für ein spannendes Projekt in Frankfurt suchen wir einen erfahrenen Implementierungsberater für IT-Sicherheit. In dieser Position übernehmen Sie die vollständige Betreuung von IT-Sicherheitsprojekten von der Anforderungsanalyse bis zur Implementierung.\n\nIhre Hauptaufgaben umfassen die Erfassung und Aufbereitung funktionaler und nicht-funktionaler Anforderungen durch Workshops und Interviews. Sie führen IT-Analysen durch, dokumentieren fachliche und regulatorische Anforderungen und überführen diese in die entsprechenden Systeme. Das Customizing in IT-Sicherheitssystemen sowie die Begleitung der technischen Umsetzung gehören ebenso zu Ihrem Verantwortungsbereich wie die Implementierung von Wallix Software.\n\nSie bereiten fachliche Abnahmetests vor, führen diese durch und dokumentieren die Ergebnisse. Beim Rollout der IT-Systeme stehen Sie beratend zur Seite und erstellen die erforderliche Anwendungsdokumentation.\n\nWir erwarten mindestens 5 Jahre Erfahrung in der IT-Security Beratung sowie fundierte Kenntnisse in der Anforderungsanalyse und fachlichen Datenmodellierung. Erfahrung mit Wallix, Cyber Ark oder ähnlichen Systemen ist erforderlich, ebenso wie Projekterfahrung in MS Projects oder Scrum.\n\nBesonders wichtig sind sehr gute fachliche Skills in mehreren Bereichen wie Security Monitoring und Incident Management (vorzugsweise Splunk), Identity & Access Management (Omada Identity, Active Directory), Vulnerability Management (Tenable), Firewalls (Fortigate, Cisco, Checkpoint) oder Privileged Access Management.\n\nDiese Position bietet Ihnen die Möglichkeit, in einem dynamischen Umfeld komplexe IT-Sicherheitslösungen zu implementieren und dabei Ihre Expertise in einem zukunftsorientierten Bereich einzusetzen.","de","106080","https:\u002F\u002Fwww.solcom.de\u002Fde\u002Fprojektportal\u002Fprojektangebote\u002Fimplementierungsberater-it-sicherheit-m-w-d-106080?utm_source=RSS&utm_medium=RSS&utm_campaign=RSS-Feed",{"items":45},[46,68,85,101,120,142,162,180,196,213,227,247,260,279,290],{"id":47,"slug":48,"title":49,"skills":50,"budget":62,"duration":28,"location":63,"onsitePercent":64,"contractType":65,"foundAt":66,"category":67},5764,"it-security-consultant","IT-Security Consultant",[51,52,53,54,55,56,57,58,59,60,61],"IT-Security","OT-Security","ISO 27001","IEC 62443","ISMS","SIEM","Auditing","TISAX","NIS2","Netzwerk-Technologien","Firewall-Technologien","45.000-90.000 EUR\u002FJahr","Neuss",40,"permanent","2026-05-22T18:09:10+00:00",{"id":35,"slug":36,"label":37},{"id":69,"slug":70,"title":71,"skills":72,"budget":81,"duration":28,"location":82,"onsitePercent":64,"contractType":65,"foundAt":83,"category":84},5756,"it-architekt-cloud-enterprise-architecture","IT-Architekt Cloud & Enterprise Architecture",[73,74,75,76,77,78,79,80],"IT-Architektur","Cloud-Architekturen","Plattform-Architekturen","Hybride Architekturen","TOGAF","Lösungsarchitektur","Systemintegration","Security","78.000-90.000 EUR\u002FJahr","Frankfurt am Main, Stuttgart oder Schwalmstadt-Ziegenhain","2026-05-22T18:07:22+00:00",{"id":35,"slug":36,"label":37},{"id":86,"slug":87,"title":88,"skills":89,"budget":97,"duration":28,"location":98,"onsitePercent":64,"contractType":65,"foundAt":99,"category":100},5753,"1st-level-support","1st Level Support",[90,91,92,93,94,95,96],"IT-Support","Helpdesk","Windows","Office 365","Ticketsystem","SLA-Überwachung","Wissensdatenbank","3.500-3.800 EUR\u002FMonat","Lüneburg","2026-05-22T18:06:42+00:00",{"id":35,"slug":36,"label":37},{"id":102,"slug":103,"title":104,"skills":105,"budget":115,"duration":28,"location":116,"onsitePercent":117,"contractType":65,"foundAt":118,"category":119},5752,"teamleiter-it-infrastructure-security-services","Teamleiter IT Infrastructure & Security Services",[106,107,60,108,24,109,110,111,112,113,114],"IT Infrastructure","Security Services","Security-Technologien","Managed Services","SLAs","SIEM\u002FSOC","Datacenter-Lösungen","Teamführung","Mentoring","75.000-95.000 EUR\u002FJahr","Berlin, Frankfurt, Hamburg, Leipzig, München oder Stuttgart",50,"2026-05-22T18:06:27+00:00",{"id":35,"slug":36,"label":37},{"id":121,"slug":122,"title":123,"skills":124,"budget":138,"duration":28,"location":139,"onsitePercent":117,"contractType":65,"foundAt":140,"category":141},5751,"senior-it-consultant-security","Senior IT Consultant Security",[125,126,127,24,128,129,130,131,132,133,134,135,136,137],"IT Security","Network Security","Data Center Security","Fortinet","Check Point","F5","CrowdStrike","Proofpoint","Zscaler","Palo Alto","Security-Architekturen","CCNP Security","Fortinet Certified Professional","70.000-85.000 EUR\u002FJahr","Hamburg oder München","2026-05-22T18:06:14+00:00",{"id":35,"slug":36,"label":37},{"id":143,"slug":144,"title":145,"skills":146,"budget":28,"duration":156,"location":157,"onsitePercent":158,"contractType":159,"foundAt":160,"category":161},5724,"manager-mwd-fuer-projekt-it-sicherheit","Manager (m\u002Fw\u002Fd) für Projekt IT-Sicherheit",[147,148,149,150,151,152,153,154,155],"IT-Sicherheit","BSI-IT-Grundschutz","IT-Grundschutztools","SAVe-Tool","IT-Sicherheitskonzepte","Informationssicherheitskonzepte","Projektmanagement","Deutsch","Englisch","24 Monate mit Option auf Verlängerung","Bremen",60,"temp_work","2026-05-22T17:40:09+00:00",{"id":35,"slug":36,"label":37},{"id":163,"slug":164,"title":165,"skills":166,"budget":28,"duration":28,"location":28,"onsitePercent":28,"contractType":65,"foundAt":178,"category":179},5693,"systemadministrator-it-infrastruktur-mwd","Systemadministrator IT-Infrastruktur (m\u002Fw\u002Fd)",[167,168,169,170,171,172,173,174,175,176,177],"Windows Server 2016","IIS-NLB","SQL Server Always On","SharePoint 2016","PowerShell","Monitoring-Tools","Checkmk","Failovercluster-Manager","Zertifikatsverwaltung","VMware","Backup","2026-05-22T17:18:06+00:00",{"id":35,"slug":36,"label":37},{"id":181,"slug":182,"title":183,"skills":184,"budget":28,"duration":28,"location":28,"onsitePercent":28,"contractType":65,"foundAt":194,"category":195},5669,"it-systemadministrator-mwd-2","IT-Systemadministrator (m\u002Fw\u002Fd)",[185,19,186,187,188,189,190,176,191,51,192,193],"Windows Server Administration","Gruppenrichtlinien","Client-Management","Microsoft 365","Exchange Online","Netzwerkkomponenten","Hyper-V","Backup-Lösungen","Monitoring","2026-05-22T17:16:12+00:00",{"id":35,"slug":36,"label":37},{"id":197,"slug":198,"title":199,"skills":200,"budget":28,"duration":28,"location":28,"onsitePercent":28,"contractType":32,"foundAt":211,"category":212},5657,"consultant-linux-security-engineer-wmd","Consultant Linux Security Engineer (w\u002Fm\u002Fd)",[201,202,203,204,205,206,207,57,208,209,210],"Linux-Systemadministration","Systemhärtung","System- und Netzwerksicherheit","Google Cloud Platform","SELinux","AppArmor","iptables\u002Fnftables","Security-Frameworks","CIS Benchmarks","BSI-Grundschutz","2026-05-22T17:14:51+00:00",{"id":35,"slug":36,"label":37},{"id":214,"slug":215,"title":216,"skills":217,"budget":28,"duration":28,"location":28,"onsitePercent":28,"contractType":65,"foundAt":225,"category":226},5643,"senior-consultant-linux-mwd","(Senior-) Consultant Linux (m\u002Fw\u002Fd)",[218,219,220,221,222,223,224],"Linux","Ubuntu","CentOS","Systemadministration","IT-Infrastruktur","Beratung","Consulting","2026-05-22T17:12:28+00:00",{"id":35,"slug":36,"label":37},{"id":228,"slug":229,"title":230,"skills":231,"budget":28,"duration":28,"location":244,"onsitePercent":28,"contractType":65,"foundAt":245,"category":246},5508,"it-security-specialist-mwd-cyber-security","IT-Security Specialist (m\u002Fw\u002Fd) Cyber-Security",[232,233,234,235,56,236,237,238,239,240,241,242,53,243],"Cyber Security","Detection Engineering","Threat Hunting","Cyber Threat Intelligence","EDR","XDR","KQL","SPL","Sigma","YARA","MITRE ATT&CK","Informationssicherheitsmanagement","Bayreuth","2026-05-22T14:05:48+00:00",{"id":35,"slug":36,"label":37},{"id":248,"slug":249,"title":250,"skills":251,"budget":28,"duration":28,"location":28,"onsitePercent":28,"contractType":32,"foundAt":258,"category":259},5449,"fachberater-secunet-sbc-wmd","Fachberater Secunet SBC (w\u002Fm\u002Fd)",[252,253,254,255,256,257,151],"Secunet SBC","IP-Netzwerke","Netzwerksicherheit","VoIP-Systeme","SBC-Systeme","Kommunikationsinfrastruktur","2026-05-22T12:35:15+00:00",{"id":35,"slug":36,"label":37},{"id":261,"slug":262,"title":263,"skills":264,"budget":28,"duration":275,"location":276,"onsitePercent":117,"contractType":32,"foundAt":277,"category":278},5443,"netzwerkkonzeption-betriebsueberfuehrung-rechenzentrumsinfrastruktur","Netzwerkkonzeption & Betriebsüberführung Rechenzentrumsinfrastruktur",[265,266,267,268,269,270,271,272,273,274],"Netzwerk-Engineering","Rechenzentrumsumgebungen","Technische Konzepte","Architekturdesigns","IT-Infrastrukturen","Betriebsübergabe","Dokumentation","Performance","Verfügbarkeit","Sicherheit","1 Woche (15.06.-19.06.2026)","Hamburg","2026-05-22T12:26:55+00:00",{"id":35,"slug":36,"label":37},{"id":280,"slug":281,"title":282,"skills":283,"budget":28,"duration":286,"location":28,"onsitePercent":287,"contractType":32,"foundAt":288,"category":289},5391,"ibm-security-verify-governance-experte-mwd","IBM Security Verify Governance Experte (m\u002Fw\u002Fd)",[284,285],"IBM Verify Identity Governance (IVIG)","IBM Security Verify Governance","15.06.2026 - 31.12.2026 + Option",0,"2026-05-22T09:40:56+00:00",{"id":35,"slug":36,"label":37},{"id":291,"slug":292,"title":293,"skills":294,"budget":28,"duration":300,"location":301,"onsitePercent":31,"contractType":159,"foundAt":302,"category":303},5389,"it-servicetechniker-mwd-fuer-netzwerke-kommunikation","IT-Servicetechniker (m\u002Fw\u002Fd) für Netzwerke & Kommunikation",[295,92,218,296,297,298,271,299,154,155],"Fachinformatiker Systemintegration","Netzwerktechnik","Virtualisierung","Softwareinstallation","Führerschein B\u002FBE","mindestens 18 Monate","Gilching","2026-05-22T09:36:05+00:00",{"id":35,"slug":36,"label":37}]