...Manager. Identify systems subject to cybersecurity regulations (e.g., Create, update, and maintain Data Flow Diagrams and Software Design Documentation. Ensure compliance with the TME Cyber Security M...
...Manager. Identify systems subject to cybersecurity regulations (e.g., Create, update, and maintain Data Flow Diagrams and Software Design Documentation. Ensure compliance with the TME Cyber Security M...
...Manager. Identify systems subject to cybersecurity regulations (e.g., Create, update, and maintain Data Flow Diagrams and Software Design Documentation. Ensure compliance with the TME Cyber Security M...
...security, AI & data analytics. The combined IT and engineering expertise brings a unique end-to-end solution offering, with four service lines – Consulting, Solutions, Talents and Academy – to support...
...security, AI & data analytics. The combined IT and engineering expertise brings a unique end-to-end solution offering, with four service lines – Consulting, Solutions, Talents and Academy – to support...
...manager / Customer Success ManagerJob descriptionCompany Description:Leexi, headquartered in the Brussels Metropolitan Area, Leexi is an AI Notetaker & B2B conversational intelligence SaaS. With Leexi...
► Functie & TakenpakketAls IT Manager bij RAJA neem je de dagelijkse leiding op jou van ons IT-team van vijf medewerkers.Je neemt actief deel in het uitbouwen van de IT-strategie van de RAJA Group. Da...
...Manager (Network). Als Senior Product Manager Networks neem je het voortouw in ons ICT-netwerk-team. Leiderschap en teammanagement Motiveren, coachen en aansturen van het ICT Netwerk team. Het stimule...
...Manager (Network). Als Senior Product Manager Networks neem je het voortouw in ons ICT-netwerk-team. Leiderschap en teammanagement Motiveren, coachen en aansturen van het ICT Netwerk team. Het stimule...
...Security dépendant de notre BU Information System. En relation avec l’ISM (Information Security Manager), vous reprenez l’existant et donnez une vision au futur du SOC (Design, build, run). Vous plani...
...Security dépendant de notre BU Information System. En relation avec l’ISM (Information Security Manager), vous reprenez l’existant et donnez une vision au futur du SOC (Design, build, run). Vous plani...
...Security dépendant de notre BU Information System. En relation avec l’ISM (Information Security Manager), vous reprenez l’existant et donnez une vision au futur du SOC (Design, build, run). Vous plani...
...Security dépendant de notre BU Information System. En relation avec l’ISM (Information Security Manager), vous reprenez l’existant et donnez une vision au futur du SOC (Design, build, run). Vous plani...
...security Consultant Location: Bruxelles Languages: English mandatory Responsibilities: Participate in system design meetings to assess cybersecurity risks and identify necessary tasks; record and shar...
...security Project Manager (Vulnerability , IAM, Access Control) Due to increasing audit pressures and a recent series of external and internal security assessments, the organization is scaling up effor...