[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"project-it-security-engineer-2":3,"similar-it-security-engineer-2":28},{"id":4,"slug":5,"title":6,"skills":7,"budget":15,"duration":15,"location":15,"onsitePercent":16,"contractType":17,"foundAt":18,"category":19,"description":23,"rawText":24,"language":25,"projectId":26,"sourceUrl":27},4627,"it-security-engineer-2","IT Security Engineer",[8,9,10,11,12,13,14],"IT-Sicherheit","Informationssicherheitskonzepte","IT-Grundschutz","SAVe Tool","Risikoanalyse","IT-Architekturen","Bundeswehr-Systeme",null,80,"contracting","2026-05-20T08:10:49+00:00",{"id":20,"slug":21,"label":22},5,"it_infra_security","IT-Infrastruktur & Security","Erstellung und Pflege von Informationssicherheitskonzepten für Bundeswehr-Systeme nach IT-Grundschutz. Durchführung von Risikoanalysen und Überwachung der Umsetzung von Sicherheitsmaßnahmen. Kommunikation mit öffentlichen Auftraggebern und militärischen Sicherheitsbehörden.","IT Security Engineer\n\nJob ID:\n3096\nJetzt loslegen\n\nOrt\n\nempty-city\n\nRahmendaten\n\n\u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\"> \u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">\u003Cstrong>Aufgaben\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Erstellung, Pflege und Fortschreibung von Informationssicherheitskonzepten (InfoSichhK) für Systeme der Bundeswehr nach der Methodik des IT-Grundschutzes gem. den gültigen Vorschriften \u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Nutzung des durch die Bundeswehr zentral bereitgestellten Tools „SAVe“\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Erstellung, Pflege und Fortschreibung entsprechender Analysen \u002F Teil-Konzepte (Risikoanalyse, Schutzbedarfsfeststellung, Risikomanagementkonzepte etc.)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Begehung der Systeme vor Ort beim Kunden (falls erforderlich)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Festlegung geeigneter Informationssicherheitsmaßnahmen\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Überwachung und Kontrolle der Umsetzung dieser Maßnahmen (firmenintern und mit dem Kunden)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Kommunikation mit dem öffentlichen Auftraggeber (öAG) \u002F Bundeswehr (Bw) sowie der Deutschen militärische Security Accreditation Authority (DEUmilSAA)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">\u003Cstrong>Profil\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Technische Ausbildung mit entsprechender Weiterbildung oder Studium\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Mehrjährige Erfahrung im Umgang mit \u002F der Erstellung von IT- \u002F Informationssicherheitskonzepten für Systeme der Bw\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Technisches Verständnis für komplexe IT Architekturen \u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Erfahrung im Umgang mit den entsprechenden Tools (z.B. SAVe)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Sehr gute Deutsch- & Englischkenntnisse in Wort und Schrift\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Selbstständige, strukturierte und eigenverantwortliche Arbeitsweise\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Reisebereitschaft (max. Umfang 20%)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv>\n\nIhr persönlicher Ansprechpartner\n\nBei Fragen können Sie sich jederzeit melden!\n\nPaula Heinemann\n\nSenior Consultant IT & Medizintechnik\n\nMobil:\n\n+49 (0)151 \u002F 644 281 78\nE-Mail:\n\nE-Mail: p.heinemann@neo-experts.com p.heinemann@neo-experts.com\nGemeinsam zum perfekten Match.\n\nJetzt bewerben","de","3096","https:\u002F\u002Fwww.neo-experts.com\u002Fstellen-suche\u002Fit-security-engineer-c7120-4c6e7",{"items":29},[30,49,66,95,120],{"id":31,"slug":32,"title":33,"skills":34,"budget":15,"duration":44,"location":45,"onsitePercent":46,"contractType":17,"foundAt":47,"category":48},4881,"it-systemadministrator-it-techniker-produktion-mobile-devices-mwd","IT-Systemadministrator \u002F IT-Techniker Produktion + Mobile Devices (m\u002Fw\u002Fd)",[35,36,37,38,39,40,41,42,43],"IT-Systemadministration","Zebra-Scanner","SOTI MobiControl","Mobile Device Management","Netzwerktechnik","LAN\u002FWLAN","TCP\u002FIP","Labeldrucker","Produktionsmaschinen-Anbindung","01.06.2026 - 31.01.2027","Köln",50,"2026-05-20T14:45:38+00:00",{"id":20,"slug":21,"label":22},{"id":50,"slug":51,"title":52,"skills":53,"budget":15,"duration":62,"location":63,"onsitePercent":46,"contractType":17,"foundAt":64,"category":65},4873,"windows-system-engineer-mwd","Windows System Engineer (m\u002Fw\u002Fd)",[54,55,56,57,58,59,60,61],"Windows Server","Active Directory Domain Services","DNS","DHCP","PowerShell","NPS","Authentifizierungsdienste","Netzwerkadministration","> 12 months","Gilching","2026-05-20T14:26:32+00:00",{"id":20,"slug":21,"label":22},{"id":67,"slug":68,"title":69,"skills":70,"budget":89,"duration":90,"location":91,"onsitePercent":92,"contractType":17,"foundAt":93,"category":94},4862,"service-delivery-manager-pki-kryptografie-operations-mwd","Service Delivery Manager PKI & Kryptografie Operations (m\u002Fw\u002Fd)",[71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88],"PKI","Kryptografie","IT Service Management","Cyber Security","Hardware Security Modules","Secrets Management","DORA","ISO 27001","PCI-DSS","BSI Grundschutz","NIST-Framework","Keyfactor EJBCA","DigiCert ONE","HashiCorp Vault","Thales Luna HSMs","Stakeholder Management","Deutsch C1","Englisch B1","auf Anfrage","09\u002F2026 bis 12\u002F2027","München",10,"2026-05-20T14:06:15+00:00",{"id":20,"slug":21,"label":22},{"id":96,"slug":97,"title":98,"skills":99,"budget":15,"duration":116,"location":15,"onsitePercent":117,"contractType":17,"foundAt":118,"category":119},4858,"5g-core-network-consultant-mwd-latency-performance","5G Core Network Consultant (m\u002Fw\u002Fd) - Latency & Performance",[100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115],"TIG-Stack","Telegraf","InfluxDB","Grafana","gNMI","SNMP","Netflow","Cisco","Juniper","IP","MPLS","VoIP","IPTV","QoS","Projektmanagement","5G Core Network","04.05.2026 - 30.12.2026",0,"2026-05-20T14:05:58+00:00",{"id":20,"slug":21,"label":22},{"id":121,"slug":122,"title":123,"skills":124,"budget":15,"duration":15,"location":131,"onsitePercent":15,"contractType":17,"foundAt":132,"category":133},4804,"outlook-exchangemailbox-analyse-expert-mwd","Outlook Exchange\u002FMailbox Analyse Expert (m\u002Fw\u002Fd)",[125,126,127,128,129,130],"Microsoft 365","Exchange Online","Microsoft Graph API","Mailbox-Analyse","Datenaufbereitung","Reporting","Thüringen","2026-05-20T12:20:54+00:00",{"id":20,"slug":21,"label":22}]