Join the Team

Fill 4

Information Security Management
(full time or student program)

Your Work

  • Work together with ERNW´s Information Security Management Team on consulting, audit and pentest projects with the opportunity to bring in and develop your own ideas
  • The team focuses on cloud, virtualization and container technologies as well as on formal security related activities (threat modeling, risk analysis)
  • Participation in different, interesting and challenging customer projects both on a technical and project lead level
  • Broad working spectrum: from assessments (audits, pentests and security evaluation) to writing/reviewing security concepts for various technologies (networking, virtualization, cloud, container solutions, K8s, etc.) to supporting our customers in security related questions regarding strategy, tactics and technology

Your Profile

  • Computer Science-related degree program (e.g. (Economic) Computer Science, Computer Networking, Mathematics, Physics) or student in this area
  • Strong interest in networking, cloud and container technologies
  • Motivated, ambitious and able to work independently
  • Willing to do practical technical work (audits, pentests, evaluations) as well as written conceptual word (security concept, hardening guidelines, audit reports…)
  • A team player with strong communication skills
  • Solid knowledge of spoken and written German and English

Your Advantages

  • Long-term development potential within ERNW
  • Comprehensive development in all areas of IT Security
  • Direct participation in projects in different (IT) environments of large international organizations
  • Modern working environment and flexible working hours
  • Research: All our employees are encouraged to work on at least one research project
  • Attending industry events, like e.g. our very own security conference TROOPERS
  • Fair pay and various financial and organizational benefits

Are you interested?

Send us your application, including CV and all necessary study experiences, via mail to If you wish to send your application encrypted, don't hesitate to ask us for a public key.