them to achieve their governance and IT risk management objectives; Develop your autonomy and your professional know...BDO in Luxembourg is looking for an IT Audit Trainee for a start in March 2026! Who are we? BDO is present in over...
strategic guidance on IT risk and outsourcing matters to senior management. Conduct and manage IT security risk assessments...’ experience in IT risk management and/or IT outsourcing oversight, preferably within the financial sector Strong understanding...
guidance on IT risk and outsourcing matters to senior management. Conduct and manage IT security risk assessments, including...Your mission Lead the development, implementation, and continuous improvement of the IT risk management framework...
& Operational Resiliency Officer will report directly into the Outsourcing Manager for the Luxembourg Bank and will work... organisation and would be attractive to a Senior Manager with either operational, outsourcing, business continuity, operational...
Security Policy Requirements: University degree in the field of IT risk management, Computer Sciences or related... Institution in Luxembourg, we are looking for a Cybersecurity Expert Lead Manager. EKXEL IT Services, is a European leader in IT...
by IT&FM Perform periodic reviews of the information security risk assessments conducted for prospective service providers... and the risk assessments conducted pursuant to the Outsourcing Policy Establish information security rules...
Security Policy Requirements: University degree in the field of IT risk management, Computer Sciences or related... Institution in Luxembourg, we are looking for a Cybersecurity Expert Lead Manager. EKXEL IT Services, is a European leader in IT...
by IT&FM Perform periodic reviews of the information security risk assessments conducted for prospective service providers... and the risk assessments conducted pursuant to the Outsourcing Policy Establish information security rules...
by IT&FM Perform periodic reviews of the information security risk assessments conducted for prospective service providers... and the risk assessments conducted pursuant to the Outsourcing Policy Establish information security rules...