Your career in IT security and reporting

Confidentiality, the accuracy of information and the minimization of information risks are just some of the issues we consider. Let’s revolutionize our customers’ security!

Why Regulation & Information Security?

In the course of digitization, IT is becoming more and more important, which means that IT risks are also increasing. In IT security management, we pursue this goal, Close security gaps and prevent risks by establishing comprehensive action plans, implementing IT security tools, and optimizing efficiency and process quality.

ITSec project development - status Q2 2023
Team development ITSec - Status Q2 2023

Our focus topics

Identity Access Management

In the management of identities and access rights ( IAM) , you put your focus on the on the protection of confidentiality and correctness of information. Knowing who has access to which ITSystems and information access has and to prevent not everyone has access to it, is for a modern IT landscape is essential.

Outsourcing Management

As a cross-sectional topic, the Outsourcing management the Possibility to create complex and interlocking elements of the ITsafety and thus an overarching understanding of develop From the structure of the
written order, through the processes

processes to the controls

we cover all areas.

Individual data processing

Due to high criticality of processed information, you will ensure in individual data processing that self-developed tools of the banking and insurance industry, e.g. based on Excel or even Python, to protect and manage.

Information Risk Management

In information risk management you identify risks and the measures to be protective crown jewels in IT. Here we define risk-reducing measures and create processes for management of risks. In doing so, we create a
Risk culture and awareness for

dealing with risks in IT.

OUR METHODOLOGICAL BASIS


Project management forms

the basis of our daily

work and provides us with the

tools to do this efficiently.
master. As methodical
ability it therefore complements

our professional

focus topics.



THAT MAKES US

FROM

What do we value?

We attach importance to a good and honest cooperation, because we are team players! That means we watch each other’s backs, give honest each other’s backs, give honest feedback and support each other.

At our company, everyone takes on small internal shows initiative and commitment and thus contributes to the contribution to the further development of our team and ADWEKO.

What makes us different?

Our ITSM team, built up at ADWEKO since 2021, consists of a colorful mix of experienced professionals and young guns, who work together on the work on the topics of IT security.

Through a planned, prudent and firm view of our goals, we lay the foundation for our the foundation stone of our success, without losing sight of the fun. without losing sight of the fun.

How do we work?

Whether at the customer or internally, we always give our all. In addition to professional competence, we always willingness to help, “going the extra mile”, is always in the foreground. Cooperation is the name of the game.

Mutual trust in each other’s abilities forms the foundation the cornerstone of success, because with us you can rely on everyone on everyone, both personally and professionally.

We value good and honest cooperation, because we are team players! This means that we have each other’s each other, give honest feedback and support each other.

With us, everyone also takes on small internal tasks, shows initiative and commitment and thus makes a contribution contribution to the further development of our team and ADWEKO.

Our ITSM team, built up at ADWEKO since 2021, consists of a colorful mix of experienced professionals and young guns, who work together on the work on the topics of IT security.

Through a planned, prudent and firm view of our goals, we lay the foundation for our the foundation stone of our success, without losing sight of the fun. without losing sight of the fun.

Whether at the customer or internally, we always give our all. In addition to professional competence, we always willingness to help, “going the extra mile”, is always in the foreground. Cooperation is the name of the game.

Mutual trust in each other’s abilities forms the foundation the cornerstone of success, because with us you can rely on everyone on everyone, both personally and professionally.

cross-sectional work on consulting areas

The protection of information and the security of IT is a cross-cutting issue in IT management. In addition to the specialist disciplines such as IAM and outsourcing, the IT security management, overarching requirements for IT such as the establishment of a governance -structure or the management of information risks.

Accordingly work We work together with all IT departments and the business on a daily basis. Together with our partners within the X1F, such as Matrix, we cooperate very closely to provide our We are able to offer customers IT security from a single source, whereby we take on the project-based implementation of IT security requirements and our colleagues take on the secure long-term operation of the IT. operation of the IT.

OPEN POSITIONS

Talk to

Dominique.

Dominique Tadayeski