{"id":10000335,"date":"2015-08-11T11:28:31","date_gmt":"2015-08-11T09:28:31","guid":{"rendered":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/?page_id=335"},"modified":"2024-09-04T15:39:31","modified_gmt":"2024-09-04T13:39:31","slug":"career-job-opportunities","status":"publish","type":"page","link":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/after-graduation\/career-job-opportunities\/","title":{"rendered":"Career and Job Opportunities"},"content":{"rendered":"<div id=\"\" class=\"wp-block-text-content margin-bottom-none\">\n    <div class=\"container-lg\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"module-migration-headline\">\n<h3>Career paths<\/h3>\n<\/div>\n\n            <\/div>\n        <\/div>\n            <\/div>\n<\/div>\n\n<div id=\"\" class=\"wp-block-text-content margin-bottom-normal\">\n    <div class=\"container-lg\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <p>Our graduates are qualified for jobs in companies processing sensitive data, e.g.<\/p>\n<ul>\n<li>ICT service companies, <\/li>\n<li>providers and businesses relying on ICT as a tool such as legal databases or e-government, <\/li>\n<li>system providers and IT consultancies, <\/li>\n<li>businesses active in the field of data security, <\/li>\n<li>investigation and prosecution of ICT crime, <\/li>\n<li>research and development.<\/li>\n<\/ul>\n<p>They can also opt to pursue an academic career by enrolling on a doctoral programme.<\/p>\n\n            <\/div>\n        <\/div>\n            <\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>With your technical know-how and practical experience you will be perfectly equipped for the professional world. Many different occupational fields and career opportunities are open to you once you have graduated. It&#8217;s up to you where you want to go.<\/p>\n","protected":false},"author":12,"featured_media":0,"parent":10000331,"menu_order":47,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/pages\/10000335"}],"collection":[{"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/comments?post=10000335"}],"version-history":[{"count":1,"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/pages\/10000335\/revisions"}],"predecessor-version":[{"id":10000670,"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/pages\/10000335\/revisions\/10000670"}],"up":[{"embeddable":true,"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/pages\/10000331"}],"wp:attachment":[{"href":"https:\/\/www.fh-joanneum.at\/it-und-mobile-security\/master\/en\/wp-json\/wp\/v2\/media?parent=10000335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}