...security best practices. Mentoring: Coach junior and mid-level developers; support knowledge sharing within the team. On-Call Rotation: After initial training, participate in the 24/7 on-call service ...
Une entreprise de technologie en Belgique recherche un Azure Architect passionné pour accompagner ses clients dans la migration vers le Cloud. Vous serez responsable de la définition de l'architecture...
...security. Expertise in Layer 3 routing protocols, Layer 2 switching and cyber security equipment (e.g., Palo Alto). Advanced certifications such as CCNP, AWS Certified Advanced Networking Specialty or...
...Security, Privacy & Compliance Apply secure coding practices across frontend, backend, and data layers. Implement authentication, authorization, secrets management, and secure data handling. Ensure co...
...security and working knowledge of operational efficiencies, resilience and strategy development Expert in Intelligence, Surveillance and Reconnaissance (ISR) as data as a service with required cloud c...
...Security Architect zorgt ervoor dat de technische en technologische keuzes binnen IT- en businessprojecten voldoen aan de beveiligingseisen van de organisatie. Hij/zij treedt op als technische autorit...
...Security Clearance: NATO SECRET Duties & Role: Under the direction of the Principal Administrator (Internal IT), the incumbent is responsible for: Develop and implement a comprehensive portfolio and p...
...Security by Design: Integratie van cybersecurity als een kernonderdeel van het ontwerp. Wat er bijkomt Je wordt verloond naar takenpakket, kennis en competenties. Met zorg werken wij een motiverend sa...
...security of cloud solutions, cost management etc. You will apply expertise in technical and consulting knowledge in advising clients and designing systems to support customer needs. In addition, this ...
...security into every layer of the application Who you are Essential Experience Expert‑level modern Python programming with mastery of type annotations Proven experience building production systems that...
...security standards Challenge and refine those principles and standards, based on field experience and feedback from BUs Guide teams in migrating from legacy (TimeXtender) systems to the new platform I...
...security, vlotte dienstverlening) en vertaalt dit naar een haalbare roadmap met duidelijke prioriteiten. - Run de dag-daagse ICT: je beheert werkplekken (Windows 10/11, Microsoft 365), e-mail & identi...
...Security Operations Center) et du CSIRT (Computer Security Incident Response Team). Ce que tu feras au quotidien Définir la vision stratégique du bureau I‑ICT.143 et aligner ses activités avec les obj...
...Security Policies (ISP and ISMP) at all times Microsoft Business Solutions Overview At our client, your long-term future is every bit as important to them as it is to you. That’s why our clients aim i...
...security. Develop a true policy and advice your stakeholders. Stakeholder management and communication is as important as the technical side of the job. Help our customers spread the word about the wh...