Student Assistant, Application Security

Denne stilling er desværre ikke længere ledig.
Se alle ledige stillinger

This is an exciting opportunity to join our team as a Student Assistant in Application Security, where you’ll gain hands-on experience in securing software development processes. You’ll support the Global Application Security team in Secure Software Development Lifecycle (SSDLC) initiatives, collaborate with international teams, and contribute to enhancing application security practices across [xxxxx]. This role will allow you to develop technical expertise while building a global professional network in a dynamic environment.This is an exciting opportunity to join our team as a Student Assistant in Application Security, where you’ll gain hands-on experience in securing software development processes. You’ll support the Global Application Security team in Secure Software Development Lifecycle (SSDLC) initiatives, collaborate with international teams, and contribute to enhancing application security practices across [xxxxx]. This role will allow you to develop technical expertise while building a global professional network in a dynamic environment.This is an exciting opportunity to join our team as a Student Assistant in Application Security, where you’ll gain hands-on experience in securing software development processes. You’ll support the Global Application Security team in Secure Software Development Lifecycle (SSDLC) initiatives, collaborate with international teams, and contribute to enhancing application security practices across [xxxxx]. This role will allow you to develop technical expertise while building a global professional network in a dynamic environment.This is an exciting opportunity to join our team as a Student Assistant in Application Security, where you’ll gain hands-on experience in securing software development processes. You’ll support the Global Application Security team in Secure Software Development Lifecycle (SSDLC) initiatives, collaborate with international teams, and contribute to enhancing application security practices across [xxxxx]. This role will allow you to develop technical expertise while building a global professional network in a dynamic environment.This is an exciting opportunity to join our team as a Student Assistant in Application Security, where you’ll gain hands-on experience in securing software development processes. You’ll support the Global Application Security team in Secure Software Development Lifecycle (SSDLC) initiatives, collaborate with international teams, and contribute to enhancing application security practices across [xxxxx]. This role will allow you to develop technical expertise while building a global professional network in a dynamic environment.Who we are

Our objective is to strengthen [xxxxx]’s security posture in a rapidly evolving threat landscape. The Global Application Security team drives SSDLC processes and technology while enabling AppSec governance to ensure secure delivery of both in-house and outsourced software development. Who we areWho we areWho we areWho we areOur objective is to strengthen [xxxxx]’s security posture in a rapidly evolving threat landscape. The Global Application Security team drives SSDLC processes and technology while enabling AppSec governance to ensure secure delivery of both in-house and outsourced software development. Our objective is to strengthen [xxxxx]’s security posture in a rapidly evolving threat landscape. The Global Application Security team drives SSDLC processes and technology while enabling AppSec governance to ensure secure delivery of both in-house and outsourced software development. Our objective is to strengthen [xxxxx]’s security posture in a rapidly evolving threat landscape. The Global Application Security team drives SSDLC processes and technology while enabling AppSec governance to ensure secure delivery of both in-house and outsourced software development. What you'll be doing What you'll be doing What you'll be doing What you'll be doing What you'll be doingAs a Student Assistant in the Application Security team, you will gain hands-on experience in securing applications and supporting key software security initiatives. You’ll work on a variety of tasks to strengthen [xxxxx]’s Secure Software Development Lifecycle (SSDLC), support software security governance processes and enhance application security awareness across the organization.As a Student Assistant in the Application Security team, you will gain hands-on experience in securing applications and supporting key software security initiatives. You’ll work on a variety of tasks to strengthen [xxxxx]’s Secure Software Development Lifecycle (SSDLC), support software security governance processes and enhance application security awareness across the organization.As a Student Assistant in the Application Security team, you will gain hands-on experience in securing applications and supporting key software security initiatives. You’ll work on a variety of tasks to strengthen [xxxxx]’s Secure Software Development Lifecycle (SSDLC), support software security governance processes and enhance application security awareness across the organization.As a Student Assistant in the Application Security team, you will gain hands-on experience in securing applications and supporting key software security initiatives. You’ll work on a variety of tasks to strengthen [xxxxx]’s Secure Software Development Lifecycle (SSDLC), support software security governance processes and enhance application security awareness across the organization.Your primary tasks and responsibility include/Specifically, your key responsibilities are:Your primary tasks and responsibility include/Specifically, your key responsibilities are:Your primary tasks and responsibility include/Specifically, your key responsibilities are:Your primary tasks and responsibility include/Specifically, your key responsibilities are:Assist in conducting application risk profiling, gathering application and software information from asset inventories, and other sources, analyzing risk factors. Maintaining and developing the Power BI dashboard for Application Risk profiling results, ensuring accurate visualization of security metrics and insights, as well as creating and modifying scripts whenever required to enhance automation and reporting.
Assist in the onboarding of applications into security tools like SAST, DAST, and ASPM solutions and track coverage and remediation efforts.
Assist in maintaining and managing secure coding training programs and platforms, oversee access and onboarding, and track training completion across the organization
Contribute to drafting and publishing documentation of procedures and guidelines in application security, as well as creating and maintaining Communication channels and websites for application security activities.
Assist in creating and sharing application security updates and newsletters to promote secure coding practices among developers.Assist in conducting application risk profiling, gathering application and software information from asset inventories, and other sources, analyzing risk factors. Maintaining and developing the Power BI dashboard for Application Risk profiling results, ensuring accurate visualization of security metrics and insights, as well as creating and modifying scripts whenever required to enhance automation and reporting.Assist in conducting application risk profiling, gathering application and software information from asset inventories, and other sources, analyzing risk factors. Maintaining and developing the Power BI dashboard for Application Risk profiling results, ensuring accurate visualization of security metrics and insights, as well as creating and modifying scripts whenever required to enhance automation and reporting.Assist in conducting application risk profiling, gathering application and software information from asset inventories, and other sources, analyzing risk factors. Maintaining and developing the Power BI dashboard for Application Risk profiling results, ensuring accurate visualization of security metrics and insights, as well as creating and modifying scripts whenever required to enhance automation and reporting.Assist in conducting application risk profiling, gathering application and software information from asset inventories, and other sources, analyzing risk factors. Maintaining and developing the Power BI dashboard for Application Risk profiling results, ensuring accurate visualization of security metrics and insights, as well as creating and modifying scripts whenever required to enhance automation and reporting.Assist in the onboarding of applications into security tools like SAST, DAST, and ASPM solutions and track coverage and remediation efforts.Assist in the onboarding of applications into security tools like SAST, DAST, and ASPM solutions and track coverage and remediation efforts.Assist in the onboarding of applications into security tools like SAST, DAST, and ASPM solutions and track coverage and remediation efforts.Assist in the onboarding of applications into security tools like SAST, DAST, and ASPM solutions and track coverage and remediation efforts.Assist in maintaining and managing secure coding training programs and platforms, oversee access and onboarding, and track training completion across the organizationAssist in maintaining and managing secure coding training programs and platforms, oversee access and onboarding, and track training completion across the organizationAssist in maintaining and managing secure coding training programs and platforms, oversee access and onboarding, and track training completion across the organizationAssist in maintaining and managing secure coding training programs and platforms, oversee access and onboarding, and track training completion across the organizationContribute to drafting and publishing documentation of procedures and guidelines in application security, as well as creating and maintaining Communication channels and websites for application security activities.Contribute to drafting and publishing documentation of procedures and guidelines in application security, as well as creating and maintaining Communication channels and websites for application security activities.Contribute to drafting and publishing documentation of procedures and guidelines in application security, as well as creating and maintaining Communication channels and websites for application security activities.Contribute to drafting and publishing documentation of procedures and guidelines in application security, as well as creating and maintaining Communication channels and websites for application security activities.Assist in creating and sharing application security updates and newsletters to promote secure coding practices among developers.Assist in creating and sharing application security updates and newsletters to promote secure coding practices among developers.Assist in creating and sharing application security updates and newsletters to promote secure coding practices among developers.Assist in creating and sharing application security updates and newsletters to promote secure coding practices among developers.What we're looking for What we're looking for What we're looking for What we're looking for What we're looking forFamiliarity with OWASP Top 10 and CWE 25.
Knowledge in Power BI for data visualization and reporting
Basic scripting or programming knowledge (Python, Java, JavaScript, or similar).
Basic understanding of SDLC concepts.
Interest in secure coding practices and security testing tools (SAST, DAST, SCA).
Strong documentation skills – ability to draft, structure, and maintain security guidelines and procedures.
Ability to communicate effectively in cross-functional teams and maintain professional relationships with internal and external stakeholders at all levels.
Curiosity and eagerness to learn about application security, governance, and risk management.Familiarity with OWASP Top 10 and CWE 25. Familiarity with OWASP Top 10 and CWE 25. Familiarity with OWASP Top 10 and CWE 25. Familiarity with OWASP Top 10 and CWE 25.Knowledge in Power BI for data visualization and reportingKnowledge in Power BI for data visualization and reportingKnowledge in Power BI for data visualization and reportingKnowledge in Power BI for data visualization and reportingBasic scripting or programming knowledge (Python, Java, JavaScript, or similar). Basic scripting or programming knowledge (Python, Java, JavaScript, or similar). Basic scripting or programming knowledge (Python, Java, JavaScript, or similar). Basic scripting or programming knowledge (Python, Java, JavaScript, or similar).Basic understanding of SDLC concepts.Basic understanding of SDLC concepts.Basic understanding of SDLC concepts.Basic understanding of SDLC concepts.Interest in secure coding practices and security testing tools (SAST, DAST, SCA).Interest in secure coding practices and security testing tools (SAST, DAST, SCA).Interest in secure coding practices and security testing tools (SAST, DAST, SCA).Interest in secure coding practices and security testing tools (SAST, DAST, SCA).Strong documentation skills – ability to draft, structure, and maintain security guidelines and procedures.Strong documentation skills – ability to draft, structure, and maintain security guidelines and procedures.Strong documentation skills – ability to draft, structure, and maintain security guidelines and procedures.Strong documentation skills – ability to draft, structure, and maintain security guidelines and procedures.Ability to communicate effectively in cross-functional teams and maintain professional relationships with internal and external stakeholders at all levels.Ability to communicate effectively in cross-functional teams and maintain professional relationships with internal and external stakeholders at all levels.Ability to communicate effectively in cross-functional teams and maintain professional relationships with internal and external stakeholders at all levels.Ability to communicate effectively in cross-functional teams and maintain professional relationships with internal and external stakeholders at all levels.Curiosity and eagerness to learn about application security, governance, and risk management.Curiosity and eagerness to learn about application security, governance, and risk management.Curiosity and eagerness to learn about application security, governance, and risk management.Curiosity and eagerness to learn about application security, governance, and risk management.What you can expect What you can expect What you can expectWe’re asking for a lot, but you’ll be well-rewarded with:We’re asking for a lot, but you’ll be well-rewarded with:Focus on your development & learning
Fun and informal work atmosphere, in a truly global team
Flexible work environment supporting a work/study life balance
Lots of responsibility, high expectations and trust from the start
Great professional challenges and chances to grow
Company Friday bars, employee benefits, and participation in Tech events
Being part of a company with an enormous heritage and a strong connection with Denmark’s Capital City Focus on your development & learning Focus on your development & learning Focus on your development & learning Focus on your development & learning Focus on your development & learningFun and informal work atmosphere, in a truly global team Fun and informal work atmosphere, in a truly global team Fun and informal work atmosphere, in a truly global team Fun and informal work atmosphere, in a truly global team Fun and informal work atmosphere, in a truly global teamFlexible work environment supporting a work/study life balance Flexible work environment supporting a work/study life balance Flexible work environment supporting a work/study life balance Flexible work environment supporting a work/study life balance Flexible work environment supporting a work/study life balanceLots of responsibility, high expectations and trust from the start Lots of responsibility, high expectations and trust from the start Lots of responsibility, high expectations and trust from the start Lots of responsibility, high expectations and trust from the start Lots of responsibility, high expectations and trust from the startGreat professional challenges and chances to grow Great professional challenges and chances to grow Great professional challenges and chances to grow Great professional challenges and chances to grow Great professional challenges and chances to growCompany Friday bars, employee benefits, and participation in Tech events Company Friday bars, employee benefits, and participation in Tech events Company Friday bars, employee benefits, and participation in Tech events Company Friday bars, employee benefits, and participation in Tech events Company Friday bars, employee benefits, and participation in Tech eventsBeing part of a company with an enormous heritage and a strong connection with Denmark’s Capital City Being part of a company with an enormous heritage and a strong connection with Denmark’s Capital City Being part of a company with an enormous heritage and a strong connection with Denmark’s Capital City Being part of a company with an enormous heritage and a strong connection with Denmark’s Capital City Being part of a company with an enormous heritage and a strong connection with Denmark’s Capital CityYou will be based out of our brand-new Central Office in Copenhagen, but you will be offered great flexibility in the role and can often work from wherever you are.You will be based out of our brand-new Central Office in Copenhagen, but you will be offered great flexibility in the role and can often work from wherever you are.You will be based out of our brand-new Central Office in Copenhagen, but you will be offered great flexibility in the role and can often work from wherever you are.You will be based out of our brand-new Central Office in Copenhagen, but you will be offered great flexibility in the role and can often work from wherever you are.You will be based out of our brand-new Central Office in Copenhagen, but you will be offered great flexibility in the role and can often work from wherever you are.[xxxxx] Integrated Information Technology (IIT) [xxxxx] Integrated Information Technology (IIT) [xxxxx] Integrated Information Technology (IIT) [xxxxx] Integrated Information Technology (IIT) [xxxxx] Integrated Information Technology (IIT) [xxxxx] Integrated Information Technology (IIT)[xxxxx] IIT is the global provider of business services to all functions, regions, and markets in the [xxxxx] Group. This includes business process design, system solutions, shared services, and system operations. IIT employs approx. 600 people.[xxxxx] IIT is the global provider of business services to all functions, regions, [xxxxx] IIT is the global provider of business services to all functions, regions, [xxxxx] IIT is the global provider of business services to all functions, regions, [xxxxx] IIT is the global provider of business services to all functions, regions,and markets in the [xxxxx] Group. This includes business process design, system and markets in the [xxxxx] Group. This includes business process design, system and markets in the [xxxxx] Group. This includes business process design, system and markets in the [xxxxx] Group. This includes business process design, systemsolutions, shared services, and system operations. IIT employs approx. 600 people.solutions, shared services, and system operations. IIT employs approx. 600 people.solutions, shared services, and system operations. IIT employs approx. 600 people.solutions, shared services, and system operations. IIT employs approx. 600 people.A tight collaboration with the local markets is established in all three regions; Western Europe, Eastern Europe and Asia. [xxxxx] IIT is situated in Valby, Copenhagen. [xxxxx] IIT is overall responsible for the provision of IT and data services across all [xxxxx] functions and markets, the words ‘Technology’ and Information’ is given.A tight collaboration with the local markets is established in all three regions; A tight collaboration with the local markets is established in all three regions; A tight collaboration with the local markets is established in all three regions; A tight collaboration with the local markets is established in all three regions;Western Europe, Eastern Europe and Asia. [xxxxx] IIT is situated in Valby, Western Europe, Eastern Europe and Asia. [xxxxx] IIT is situated in Valby, Western Europe, Eastern Europe and Asia. [xxxxx] IIT is situated in Valby, Western Europe, Eastern Europe and Asia. [xxxxx] IIT is situated in Valby,Copenhagen. [xxxxx] IIT is overall responsible for the provision of IT and data Copenhagen. [xxxxx] IIT is overall responsible for the provision of IT and data Copenhagen. [xxxxx] IIT is overall responsible for the provision of IT and data Copenhagen. [xxxxx] IIT is overall responsible for the provision of IT and dataservices across all [xxxxx] functions and markets, the words ‘Technology’ and services across all [xxxxx] functions and markets, the words ‘Technology’ and services across all [xxxxx] functions and markets, the words ‘Technology’ and services across all [xxxxx] functions and markets, the words ‘Technology’ andInformation’ is given.Information’ is given.Information’ is given.Information’ is given.The word ‘Integrated’ refers to the fact that the IIT Function will operate in close alignment with the business agenda of functions and regions. Furthermore, ‘Integrated’ hints that services provided by IIT should be a naturally embedded part of our colleague’s work.
The word ‘Integrated’ refers to the fact that the IIT Function will operate in close alignment with the business agenda of functions and regions. Furthermore, ‘Integrated’ hints that services provided by IIT should be a naturally embedded part of our colleague’s work.The word ‘Integrated’ refers to the fact that the IIT Function will operate in close alignment with the business agenda of functions and regions. Furthermore, ‘Integrated’ hints that services provided by IIT should be a naturally embedded part of our colleague’s work.The word ‘Integrated’ refers to the fact that the IIT Function will operate in close alignment with the business agenda of functions and regions. Furthermore, ‘Integrated’ hints that services provided by IIT should be a naturally embedded part of our colleague’s work.The word ‘Integrated’ refers to the fact that the IIT Function will operate in close alignment with the business agenda of functions and regions. Furthermore, ‘Integrated’ hints that services provided by IIT should be a naturally embedded part of our colleague’s work.Interested?Interested?Interested?Interested?Interested?Apply through the link. Please notice that this is the only way we accept applications. For questions about the position please contact Application Security Specialist, Aswani Raveendran at aswani.raveendran@[xxxxx].com. Deadline for applying is on the 7th of March. We read applications continuously, and vacancies may be filled sooner than the deadline, so we encourage you to apply as early as possible.
Apply through the link. Please notice that this is the only way we accept applications. For questions about the position please contact Application Security Specialist, Aswani Raveendran at aswani.raveendran@[xxxxx].com. Deadline for applying is on the 7th of March. We read applications continuously, and vacancies may be filled sooner than the deadline, so we encourage you to apply as early as possible.Apply through the link. Please notice that this is the only way we accept applications. For questions about the position please contact Application Security Specialist, Aswani Raveendran at aswani.raveendran@[xxxxx].com. Deadline for applying is on the 7th of March. We read applications continuously, and vacancies may be filled sooner than the deadline, so we encourage you to apply as early as possible.Apply through the link. Please notice that this is the only way we accept applications. For questions about the position please contact Application Security Specialist, Aswani Raveendran at aswani.raveendran@[xxxxx].com. Deadline for applying is on the 7th of March. We read applications continuously, and vacancies may be filled sooner than the deadline, so we encourage you to apply as early as possible.Apply through the link. Please notice that this is the only way we accept applications. For questions about the position please contact Application Security Specialist, Aswani Raveendran at aswani.raveendran@[xxxxx].com. Deadline for applying is on the 7th of March. We read applications continuously, and vacancies may be filled sooner than the deadline, so we encourage you to apply as early as possible.please contact Application Security Specialist, Aswani Raveendran7th of MarchWe look forward to receiving your application.We look forward to receiving your application.We look forward to receiving your application.We look forward to receiving your application.We look forward to receiving your application.[xxxxx] Group: Brewing for a better today and tomorrow[xxxxx] Group: Brewing for a better today and tomorrow[xxxxx] Group: Brewing for a better today and tomorrowFor us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile, inclusive and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.For us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile, inclusive and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.For us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile, inclusive and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.For us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile, inclusive and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.For us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile, inclusive and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.or us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile, or us success has always been in the diverse mix of our people, our beers and our brands. At [xxxxx], we want to recruit and develop people with a global mindset, cultural understanding, and international experience to ensure that our organization stays agile,inclusiveinclusive and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.and prepared for future growth. Only by acknowledging and harvesting from different perspectives and experiences, will we gain competitive advantage and leverage the effect of diversity for business growth. [xxxxx] aims to create equal access to opportunity regardless of social identity, and we encourage everyone to apply regardless of gender, nationality, race, religion or any other characteristics protected by law.


Information og data

Denne ledige stilling har jobtypen "Sikkerhedsmedarbejder", og befinder sig i kategorien "Kontor, handel og service".

Jobbet er oprettet på vores service den 18.2.2025, men kan have været deaktiveret og genaktiveret igen.

Dagligt opdateret: Dette job opdateres dagligt ud fra jobudbyderens hjemmeside via vores søgemaskineteknologi og er aktivt lige nu.
  • Sikkerhedsmedarbejder

Statistik over udbudte jobs som sikkerhedsmedarbejdere

Herunder ser du udviklingen i udbudte sikkerhedsmedarbejder over tid. Bemærk at jobs der ikke har en bestemt geografi ikke er medtaget i tabellen. I den første kolonne ser du datoen. I den næste kolonne ser du det samlede antal sikkerhedsmedarbejdere.

Se flere statistikker her:
Statistik over udbudte sikkerhedsmedarbejdere over tid

Dato Alle jobs som sikkerhedsmedarbejdere
2. april 2025 72
1. april 2025 72
31. marts 2025 72
30. marts 2025 74
29. marts 2025 75
28. marts 2025 71
27. marts 2025 72
26. marts 2025 71
25. marts 2025 150
24. marts 2025 147
23. marts 2025 139
22. marts 2025 139
21. marts 2025 146
20. marts 2025 147
19. marts 2025 148
18. marts 2025 149
17. marts 2025 147
16. marts 2025 148
15. marts 2025 148
14. marts 2025 149
13. marts 2025 144
12. marts 2025 147
11. marts 2025 142
10. marts 2025 141
9. marts 2025 142
8. marts 2025 142
7. marts 2025 144
6. marts 2025 140
5. marts 2025 141
4. marts 2025 139
3. marts 2025 139