Administration, maintenance, troubleshooting and further development of our infrastructure, 2nd level support, 3rd level support together with our service providers and the respective manufacturers, Establishing solutions in the IT environment and transferring them to operations, Carrying out projects in the IT infrastructure, Cross-departmental collaboration and assumption of sub-projects, Development and standardization of processes as well as maintenance and creation of documentation and operating instructions, Monitoring and optimization of the system landscape, Creation of decision-making templates, Reporting, Vulnerability management - identification, assessment and remediation of security vulnerabilities, User access management - administration, monitoring and reporting of user rights and roles, Security policies and standards - participation in the development and enforcement of IT security policies, procedures and standards, Training and awareness: Conducting training courses and campaigns to raise employee awareness, Threat monitoring: Analysis of threat information and proactive adaptation of security measures