...security standards and internal policies Collaborate with Risk, Compliance, and Audit team Communication & Reporting Produce dashboards and key performance indicators (KPIs) for delivery tracking Comm...
ENGIE zoekt heel wat collega’s om mee te werken aan een koolstofneutrale toekomst! Om leider van de koolstofneutrale transitie in België te worden, beheerst ENGIE alle beroepen uit de energiesector: v...
...security grondige kennis van PSIM/PIAM-systemen sterke basis in netwerkinfrastructuur en protocollen (TCP/IP, VLAN, VPN, firewallconfiguraties) inzicht in integratie van securitysystemen binnen IT-net...
...Security, Cloud Applications, IDM, Identity Management, Customer Management, Acting, Small Business, Go-to-Market, Sales Cycle, Microsoft Security, Ecosystems, Trilingual, Conditional Access, Security...
...security policies and procedures Designing zero-trust security architectures and secure systems Leading vulnerability scanning, penetration testing, and security audits Managing cloud and network secu...
...security policies and procedures Designing zero-trust security architectures and secure systems Leading vulnerability scanning, penetration testing, and security audits Managing cloud and network secu...
...Security Incident Response Team (CSIRT). As a key member of this team, you will play a vital role in detecting, analyzing, and responding to security incidents that impact our clients. The ideal candi...
...security, high availability, and cost efficiency.• Implement and Enforce security best practices to comply with IBM Financial Services certification, financial regulations and customer compliance requ...
...security risks, third party security, compliance and stakeholder management. Your profile Strong experience around Information Security and Risk Standards and Frameworks such as DORA, ISO, NIST, OWASP...
...Security Stack You will promote the complete Microsoft security ecosystem, including: Microsoft Defender (Endpoint, Identity, Cloud Apps) Microsoft Entra (IAM, Conditional Access, Privileged Identity ...
...security risks, third party security, compliance and stakeholder management. Your profile Strong experience around Information Security and Risk Standards and Frameworks such as DORA, ISO, NIST, OWA...
...Security Risk Officer You will play a key role in defining, implementing, and maintaining the company's Information Security, Risk Management, and . You will work within the CISO team and report direc...
...Security Stack You will promote the complete Microsoft security ecosystem, including: Microsoft Defender (Endpoint, Identity, Cloud Apps) Microsoft Entra (IAM, Conditional Access, Privileged Identity ...
...Security en Cyber Resilience. Profiel Je hebt een sterke affiniteit voor dataplatformen, cloudtechnologie en digitale transformatie. Het bezitten van een masterdiploma is een pluspunt. Je hebt minsten...
...security zoals SSL / PKI / Certificaten / Hashing / Encryptie / Webtokens / OAuth2 / … Gebruik van automated test tools en scripts zoals Postman. Het gebruik van Appium is een plus. - Onze mobile app ...