[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"project-it-security-engineer":3,"similar-it-security-engineer":29},{"id":4,"slug":5,"title":6,"skills":7,"budget":16,"duration":16,"location":16,"onsitePercent":17,"contractType":18,"foundAt":19,"category":20,"description":24,"rawText":25,"language":26,"projectId":27,"sourceUrl":28},2638,"it-security-engineer","IT Security Engineer",[8,9,10,11,12,13,14,15],"IT-Grundschutz","Informationssicherheitskonzepte","SAVe Tool","Risikoanalyse","IT-Architekturen","Bundeswehr-Systeme","Deutsch","Englisch",null,80,"contracting","2026-05-13T16:07:41+00:00",{"id":21,"slug":22,"label":23},5,"it_infra_security","IT-Infrastruktur & Security","Erstellung und Pflege von Informationssicherheitskonzepten für Bundeswehr-Systeme nach IT-Grundschutz. Durchführung von Risikoanalysen und Überwachung der Umsetzung von Sicherheitsmaßnahmen. Kommunikation mit öffentlichen Auftraggebern und militärischen Sicherheitsbehörden.","IT Security Engineer\n\nJob ID:\n3096\nJetzt loslegen\n\nOrt\n\nempty-city\n\nRahmendaten\n\n\u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\"> \u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">\u003Cstrong>Aufgaben\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Erstellung, Pflege und Fortschreibung von Informationssicherheitskonzepten (InfoSichhK) für Systeme der Bundeswehr nach der Methodik des IT-Grundschutzes gem. den gültigen Vorschriften \u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Nutzung des durch die Bundeswehr zentral bereitgestellten Tools „SAVe“\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Erstellung, Pflege und Fortschreibung entsprechender Analysen \u002F Teil-Konzepte (Risikoanalyse, Schutzbedarfsfeststellung, Risikomanagementkonzepte etc.)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Begehung der Systeme vor Ort beim Kunden (falls erforderlich)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Festlegung geeigneter Informationssicherheitsmaßnahmen\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Überwachung und Kontrolle der Umsetzung dieser Maßnahmen (firmenintern und mit dem Kunden)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Kommunikation mit dem öffentlichen Auftraggeber (öAG) \u002F Bundeswehr (Bw) sowie der Deutschen militärische Security Accreditation Authority (DEUmilSAA)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">\u003Cstrong>Profil\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Technische Ausbildung mit entsprechender Weiterbildung oder Studium\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Mehrjährige Erfahrung im Umgang mit \u002F der Erstellung von IT- \u002F Informationssicherheitskonzepten für Systeme der Bw\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Technisches Verständnis für komplexe IT Architekturen \u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Erfahrung im Umgang mit den entsprechenden Tools (z.B. SAVe)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Sehr gute Deutsch- & Englischkenntnisse in Wort und Schrift\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Selbstständige, strukturierte und eigenverantwortliche Arbeitsweise\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv> \u003Cdiv style=\"\">\u003Cspan style=\"font-size: 12.0pt;\">\u003Cspan style=\"font-family: Arial , Arial , Helvetica , sans-serif;\">\u003Cspan style=\"color: rgb(0,0,0);\">· Reisebereitschaft (max. Umfang 20%)\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fspan>\u003C\u002Fdiv>\n\nIhr persönlicher Ansprechpartner\n\nBei Fragen können Sie sich jederzeit melden!\n\nPaula Heinemann\n\nSenior Consultant IT & Medizintechnik\n\nMobil:\n\n+49 (0)151 \u002F 644 281 78\nE-Mail:\n\nE-Mail: p.heinemann@neo-experts.com p.heinemann@neo-experts.com\nGemeinsam zum perfekten Match.\n\nJetzt bewerben","de","3096","https:\u002F\u002Fwww.neo-experts.com\u002Fstellen-suche\u002Fit-security-engineer-c7120",{"items":30},[31,50,67,96,121],{"id":32,"slug":33,"title":34,"skills":35,"budget":16,"duration":45,"location":46,"onsitePercent":47,"contractType":18,"foundAt":48,"category":49},4881,"it-systemadministrator-it-techniker-produktion-mobile-devices-mwd","IT-Systemadministrator \u002F IT-Techniker Produktion + Mobile Devices (m\u002Fw\u002Fd)",[36,37,38,39,40,41,42,43,44],"IT-Systemadministration","Zebra-Scanner","SOTI MobiControl","Mobile Device Management","Netzwerktechnik","LAN\u002FWLAN","TCP\u002FIP","Labeldrucker","Produktionsmaschinen-Anbindung","01.06.2026 - 31.01.2027","Köln",50,"2026-05-20T14:45:38+00:00",{"id":21,"slug":22,"label":23},{"id":51,"slug":52,"title":53,"skills":54,"budget":16,"duration":63,"location":64,"onsitePercent":47,"contractType":18,"foundAt":65,"category":66},4873,"windows-system-engineer-mwd","Windows System Engineer (m\u002Fw\u002Fd)",[55,56,57,58,59,60,61,62],"Windows Server","Active Directory Domain Services","DNS","DHCP","PowerShell","NPS","Authentifizierungsdienste","Netzwerkadministration","> 12 months","Gilching","2026-05-20T14:26:32+00:00",{"id":21,"slug":22,"label":23},{"id":68,"slug":69,"title":70,"skills":71,"budget":90,"duration":91,"location":92,"onsitePercent":93,"contractType":18,"foundAt":94,"category":95},4862,"service-delivery-manager-pki-kryptografie-operations-mwd","Service Delivery Manager PKI & Kryptografie Operations (m\u002Fw\u002Fd)",[72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89],"PKI","Kryptografie","IT Service Management","Cyber Security","Hardware Security Modules","Secrets Management","DORA","ISO 27001","PCI-DSS","BSI Grundschutz","NIST-Framework","Keyfactor EJBCA","DigiCert ONE","HashiCorp Vault","Thales Luna HSMs","Stakeholder Management","Deutsch C1","Englisch B1","auf Anfrage","09\u002F2026 bis 12\u002F2027","München",10,"2026-05-20T14:06:15+00:00",{"id":21,"slug":22,"label":23},{"id":97,"slug":98,"title":99,"skills":100,"budget":16,"duration":117,"location":16,"onsitePercent":118,"contractType":18,"foundAt":119,"category":120},4858,"5g-core-network-consultant-mwd-latency-performance","5G Core Network Consultant (m\u002Fw\u002Fd) - Latency & Performance",[101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116],"TIG-Stack","Telegraf","InfluxDB","Grafana","gNMI","SNMP","Netflow","Cisco","Juniper","IP","MPLS","VoIP","IPTV","QoS","Projektmanagement","5G Core Network","04.05.2026 - 30.12.2026",0,"2026-05-20T14:05:58+00:00",{"id":21,"slug":22,"label":23},{"id":122,"slug":123,"title":124,"skills":125,"budget":16,"duration":16,"location":132,"onsitePercent":16,"contractType":18,"foundAt":133,"category":134},4804,"outlook-exchangemailbox-analyse-expert-mwd","Outlook Exchange\u002FMailbox Analyse Expert (m\u002Fw\u002Fd)",[126,127,128,129,130,131],"Microsoft 365","Exchange Online","Microsoft Graph API","Mailbox-Analyse","Datenaufbereitung","Reporting","Thüringen","2026-05-20T12:20:54+00:00",{"id":21,"slug":22,"label":23}]