As the corporate customers arm of Deutsche Telekom T-Systems provides integrated solutions for the networked future of business and society. Drawing on a global infrastructure of data centers and networks, T-Systems operates information and communication technology (ICT) systems for multinational corporations and public sector institutions. Around 46,000 employees at T-Systems combine industry expertise and ICT innovations to add significant value to customers’ core business all over the world.
IT Services Hungary Ltd. (ITSH) is a 100% Hungarian subsidiary of T-Systems. Within a broad portfolio of ICT consultation services, ITSH concentrates on the management and outsourcing of IT solutions, and also development and system integration.
We are looking for colleagues who like challenges and consider their profession as part of their life.
Let IT be your passion!
You will provide security consultancy services in different areas of the classical ICT business and/or Cyber Security. As Security Consultant you will work autonomously and/or within a team for customers of T-Systems (national and international clients).
As Security Consultant you will provide information security subject matter expertise and advice. Your activities will have a focus on at least one of the following 3 areas:
1. Information Security Management Consulting
Providing consultancy advice on information security risk and control matters for our clients.
Developing information security management systems (security standards, strategies, security controls and guidelines).
Designing and implementing of security processes and security concepts in the classical ICT arena.
Supporting the standardized Privacy and Security Assessment (PSA) process of Deutsche Telekom AG for internal projects of Deutsche Telekom and T-Systems.
Execution of information security awareness training and educational activities.
2. ICT Security Solution Consulting (e.g. for infrastructure, application, networks, operating systems) including the design, configuration, development, testing and deployment of security-related technologies such as
Security Information & Event Monitoring (SIEM),
IDS/IPS, Data Loss Prevention,
Identity & Access Management,
Public Key Infrastructures,
3. Cyber Security Consulting
Designing and implementing security operation center (architecture & processes).
Conducting vulnerability scans and penetration testing.
Providing forensics and malware analysis.
Providing threat intelligence services.
Supporting security incident handling.
Deep knowledge and practical experience in at least one of the above mentioned knowledge areas (Information Security Management Consulting, ICT Security So