{"id":41749,"date":"2020-01-08T11:05:07","date_gmt":"2020-01-08T11:05:07","guid":{"rendered":"https:\/\/resources.workable.com\/?p=41749"},"modified":"2020-02-06T13:16:31","modified_gmt":"2020-02-06T13:16:31","slug":"descriptif-de-poste-specialiste-de-la-securite-informatique-f-h-autre","status":"publish","type":"post","link":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste","title":{"rendered":"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique&nbsp;(f\/h\/autre)"},"content":{"rendered":"<p>Le pr\u00e9sent mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique a \u00e9t\u00e9 optimis\u00e9 \u00e0 des fins de publication sur des sites d&rsquo;annonces ou des pages d&#8217;emploi en ligne, ainsi que pour \u00eatre ais\u00e9ment personnalis\u00e9 en fonction des besoins de votre entreprise.<\/p>\n<h2>Responsabilit\u00e9s du Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique:<\/h2>\n<ul>\n<li>Conception et mise en \u0153uvre de mesures de s\u00e9curit\u00e9 et de contr\u00f4les<\/li>\n<li>Contr\u00f4le de l&rsquo;activit\u00e9 des r\u00e9seaux afin d&rsquo;identifier les points vuln\u00e9rables<\/li>\n<li>R\u00e9action face aux failles de confidentialit\u00e9 et aux menaces pos\u00e9es par des logiciels malveillants<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12456\" src=\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg\" alt=\"descriptif du poste de sp\u00e9cialiste de la s\u00e9curit\u00e9\" width=\"640\" height=\"230\" srcset=\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg 640w, https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213-200x72.jpg 200w, https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213-560x201.jpg 560w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le pr\u00e9sent mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique a \u00e9t\u00e9 optimis\u00e9 \u00e0 des fins de publication sur des sites d&rsquo;annonces ou des pages d&#8217;emploi en ligne, ainsi que pour \u00eatre ais\u00e9ment personnalis\u00e9 en fonction des besoins de votre entreprise. Responsabilit\u00e9s du Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique: Conception et mise en [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[1041,1042],"tags":[],"class_list":["post-41749","post","type-post","status-publish","format-standard","hentry","category-descriptifs-de-postes","category-descriptifs-de-postes-en-informatique-et-developpement"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique (f\/h\/autre) - Workable<\/title>\n<meta name=\"description\" content=\"Ce mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique peut facilement \u00eatre adapt\u00e9 \u00e0 vos besoins et publi\u00e9 sur des sites d&#039;annonces et des pages d&#039;emploi en ligne.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique (f\/h\/autre)\" \/>\n<meta property=\"og:description\" content=\"Ce mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique peut facilement \u00eatre adapt\u00e9 \u00e0 vos besoins et publi\u00e9 sur des sites d&#039;annonces et des pages d&#039;emploi en ligne.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\" \/>\n<meta property=\"og:site_name\" content=\"Recruiting Resources: How to Recruit and Hire Better\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/business.facebook.com\/workable\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-08T11:05:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-06T13:16:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg\" \/>\n<meta name=\"author\" content=\"Nikoletta Bika\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@workable\" \/>\n<meta name=\"twitter:site\" content=\"@workable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nikoletta Bika\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#article\",\"isPartOf\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\"},\"author\":{\"name\":\"Nikoletta Bika\",\"@id\":\"https:\/\/resources.workable.com\/fr\/#\/schema\/person\/bddaa2e41481e7c9ef2328432ea089e7\"},\"headline\":\"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique&nbsp;(f\/h\/autre)\",\"datePublished\":\"2020-01-08T11:05:07+00:00\",\"dateModified\":\"2020-02-06T13:16:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\"},\"wordCount\":118,\"publisher\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage\"},\"thumbnailUrl\":\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg\",\"articleSection\":[\"Descriptifs de postes\",\"Descriptifs de postes en informatique et d\u00e9veloppement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\",\"url\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\",\"name\":\"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique (f\/h\/autre) - Workable\",\"isPartOf\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage\"},\"image\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage\"},\"thumbnailUrl\":\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg\",\"datePublished\":\"2020-01-08T11:05:07+00:00\",\"dateModified\":\"2020-02-06T13:16:31+00:00\",\"description\":\"Ce mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique peut facilement \u00eatre adapt\u00e9 \u00e0 vos besoins et publi\u00e9 sur des sites d'annonces et des pages d'emploi en ligne.\",\"breadcrumb\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage\",\"url\":\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg\",\"contentUrl\":\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/resources.workable.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique&nbsp;(f\/h\/autre)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/resources.workable.com\/fr\/#website\",\"url\":\"https:\/\/resources.workable.com\/fr\/\",\"name\":\"Recruiting Resources: How to Recruit and Hire Better\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/resources.workable.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/resources.workable.com\/fr\/#organization\",\"name\":\"Workable\",\"url\":\"https:\/\/resources.workable.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/resources.workable.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/12\/logo-green.png\",\"contentUrl\":\"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/12\/logo-green.png\",\"width\":150,\"height\":25,\"caption\":\"Workable\"},\"image\":{\"@id\":\"https:\/\/resources.workable.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/business.facebook.com\/workable\/\",\"https:\/\/x.com\/workable\",\"https:\/\/www.linkedin.com\/company\/workable-hr\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/resources.workable.com\/fr\/#\/schema\/person\/bddaa2e41481e7c9ef2328432ea089e7\",\"name\":\"Nikoletta Bika\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/resources.workable.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/777bf31309608e9152307199dd8aa97ff19f24849526f1b2b50f11b9ea40fca3?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/777bf31309608e9152307199dd8aa97ff19f24849526f1b2b50f11b9ea40fca3?s=96&d=mm&r=pg\",\"caption\":\"Nikoletta Bika\"},\"description\":\"Nikoletta Bika was a senior writer at Workable for nearly four and a half years. She holds an MSc in HR and has written extensively about all things HR and recruiting, with a particular interest in bias, data, technology, legal compliance, and the future of work. She hates meaningless jargon and dreams about space travel.\",\"sameAs\":[\"http:\/\/workable.com\"],\"url\":\"https:\/\/resources.workable.com\/fr\/author\/nikoletta-bika\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique (f\/h\/autre) - Workable","description":"Ce mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique peut facilement \u00eatre adapt\u00e9 \u00e0 vos besoins et publi\u00e9 sur des sites d'annonces et des pages d'emploi en ligne.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste\/","og_locale":"fr_FR","og_type":"article","og_title":"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique (f\/h\/autre)","og_description":"Ce mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique peut facilement \u00eatre adapt\u00e9 \u00e0 vos besoins et publi\u00e9 sur des sites d'annonces et des pages d'emploi en ligne.","og_url":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste","og_site_name":"Recruiting Resources: How to Recruit and Hire Better","article_publisher":"https:\/\/business.facebook.com\/workable\/","article_published_time":"2020-01-08T11:05:07+00:00","article_modified_time":"2020-02-06T13:16:31+00:00","og_image":[{"url":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg","type":"","width":"","height":""}],"author":"Nikoletta Bika","twitter_card":"summary_large_image","twitter_creator":"@workable","twitter_site":"@workable","twitter_misc":{"\u00c9crit par":"Nikoletta Bika","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#article","isPartOf":{"@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste"},"author":{"name":"Nikoletta Bika","@id":"https:\/\/resources.workable.com\/fr\/#\/schema\/person\/bddaa2e41481e7c9ef2328432ea089e7"},"headline":"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique&nbsp;(f\/h\/autre)","datePublished":"2020-01-08T11:05:07+00:00","dateModified":"2020-02-06T13:16:31+00:00","mainEntityOfPage":{"@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste"},"wordCount":118,"publisher":{"@id":"https:\/\/resources.workable.com\/fr\/#organization"},"image":{"@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage"},"thumbnailUrl":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg","articleSection":["Descriptifs de postes","Descriptifs de postes en informatique et d\u00e9veloppement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste","url":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste","name":"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique (f\/h\/autre) - Workable","isPartOf":{"@id":"https:\/\/resources.workable.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage"},"image":{"@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage"},"thumbnailUrl":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg","datePublished":"2020-01-08T11:05:07+00:00","dateModified":"2020-02-06T13:16:31+00:00","description":"Ce mod\u00e8le de descriptif de poste de Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique peut facilement \u00eatre adapt\u00e9 \u00e0 vos besoins et publi\u00e9 sur des sites d'annonces et des pages d'emploi en ligne.","breadcrumb":{"@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#primaryimage","url":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg","contentUrl":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/04\/security-specialist-shutterstock_574000213.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/resources.workable.com\/fr\/specialiste-de-la-securite-informatique-descriptif-de-poste#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/resources.workable.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Descriptif de poste: Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique&nbsp;(f\/h\/autre)"}]},{"@type":"WebSite","@id":"https:\/\/resources.workable.com\/fr\/#website","url":"https:\/\/resources.workable.com\/fr\/","name":"Recruiting Resources: How to Recruit and Hire Better","description":"","publisher":{"@id":"https:\/\/resources.workable.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/resources.workable.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/resources.workable.com\/fr\/#organization","name":"Workable","url":"https:\/\/resources.workable.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/resources.workable.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/12\/logo-green.png","contentUrl":"https:\/\/resources.workable.com\/wp-content\/uploads\/2017\/12\/logo-green.png","width":150,"height":25,"caption":"Workable"},"image":{"@id":"https:\/\/resources.workable.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/business.facebook.com\/workable\/","https:\/\/x.com\/workable","https:\/\/www.linkedin.com\/company\/workable-hr\/"]},{"@type":"Person","@id":"https:\/\/resources.workable.com\/fr\/#\/schema\/person\/bddaa2e41481e7c9ef2328432ea089e7","name":"Nikoletta Bika","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/resources.workable.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/777bf31309608e9152307199dd8aa97ff19f24849526f1b2b50f11b9ea40fca3?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/777bf31309608e9152307199dd8aa97ff19f24849526f1b2b50f11b9ea40fca3?s=96&d=mm&r=pg","caption":"Nikoletta Bika"},"description":"Nikoletta Bika was a senior writer at Workable for nearly four and a half years. She holds an MSc in HR and has written extensively about all things HR and recruiting, with a particular interest in bias, data, technology, legal compliance, and the future of work. She hates meaningless jargon and dreams about space travel.","sameAs":["http:\/\/workable.com"],"url":"https:\/\/resources.workable.com\/fr\/author\/nikoletta-bika\/"}]}},"modified_by":null,"custom_fields":{"brief":"Nous recherchons un Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique, qui sera charg\u00e9 de mettre en \u0153uvre et de g\u00e9rer nos syst\u00e8mes de s\u00e9curit\u00e9. Vous serez charg\u00e9 d'emp\u00eacher l'acc\u00e8s non autoris\u00e9 \u00e0 nos donn\u00e9es et de contrer les failles de s\u00e9curit\u00e9.\r\n\r\nPour ce poste, vous devrez conna\u00eetre les structures et les syst\u00e8mes de s\u00e9curit\u00e9. Si vous \u00eates \u00e9galement capable de <a href=\"https:\/\/resources.workable.com\/problem-solving-interview-questions\" target=\"_blank\" rel=\"noopener\">r\u00e9soudre les probl\u00e8mes<\/a> et de prendre rapidement des d\u00e9cisions, nous aimerions vous rencontrer.\r\n\r\nVotre objectif consistera \u00e0 veiller \u00e0 la bonne protection de nos infrastructures technologiques.","requirements":"<ul>\r\n \t<li>Exp\u00e9rience confirm\u00e9e en tant que Sp\u00e9cialiste de la s\u00e9curit\u00e9 informatique.<\/li>\r\n \t<li>Des connaissances en programmation sont pr\u00e9f\u00e9rables (ex.\u00a0: connaissance des langages C++ et PHP)<\/li>\r\n \t<li>Connaissance des structures de s\u00e9curit\u00e9 (ex.\u00a0: structure de cybers\u00e9curit\u00e9 NIST) et des m\u00e9thodologies de gestion des risques<\/li>\r\n \t<li>Connaissance de la gestion des correctifs, des pare-feux et des syst\u00e8mes de d\u00e9tection\/pr\u00e9vention des intrusions (ex.\u00a0: TippingPoint)<\/li>\r\n \t<li>Connaissance de l'infrastructure \u00e0 cl\u00e9 publique et des protocoles cryptographiques (ex.\u00a0: SSL\/ TLS)<\/li>\r\n \t<li>Esprit analytique et excellentes capacit\u00e9s en mati\u00e8re de r\u00e9solution de probl\u00e8mes<\/li>\r\n \t<li>Excellentes capacit\u00e9s en mati\u00e8re de communication et d'organisation<\/li>\r\n \t<li>Comp\u00e9tences en mati\u00e8re de prise de d\u00e9cision<\/li>\r\n \t<li>Licence en informatique, en technologie de l'information ou dans un domaine apparent\u00e9\u00a0; une certification professionnelle (ex.\u00a0: CompTIA Security+, CISSP) constitue un avantage<\/li>\r\n<\/ul>","responsibilities":"<ul>\r\n \t<li>Analyser les sp\u00e9cifications informatiques afin d'\u00e9valuer les risques de s\u00e9curit\u00e9<\/li>\r\n \t<li>Concevoir et mettre en \u0153uvre des mesures de s\u00e9curit\u00e9 ainsi que des plans de r\u00e9cup\u00e9ration des donn\u00e9es<\/li>\r\n \t<li>Installer, configurer et mettre \u00e0 niveau le logiciel de s\u00e9curit\u00e9 (ex.\u00a0: programmes antivirus)<\/li>\r\n \t<li>S\u00e9curiser les r\u00e9seaux par le biais de pare-feux, de protection par mot de passe et autres syst\u00e8mes<\/li>\r\n \t<li>Inspecter le mat\u00e9riel afin d'identifier tout point d'acc\u00e8s vuln\u00e9rable<\/li>\r\n \t<li>Contr\u00f4ler les activit\u00e9s de r\u00e9seau afin d'identifier les probl\u00e8mes au plus t\u00f4t et de les communiquer aux \u00e9quipes informatiques<\/li>\r\n \t<li>R\u00e9agir aux failles de confidentialit\u00e9 et aux menaces pos\u00e9es par des logiciels malveillants<\/li>\r\n \t<li>Agir en tant qu'expert(e) en mati\u00e8re de s\u00e9curit\u00e9 et organiser des formations si n\u00e9cessaire<\/li>\r\n \t<li>R\u00e9diger des politiques et des directives<\/li>\r\n<\/ul>","see_more":""},"_links":{"self":[{"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/posts\/41749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/comments?post=41749"}],"version-history":[{"count":0,"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/posts\/41749\/revisions"}],"wp:attachment":[{"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/media?parent=41749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/categories?post=41749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/resources.workable.com\/fr\/wp-json\/wp\/v2\/tags?post=41749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}