...Information Act, and the NATO Security Principles;Managing software assets from planning, requests, procurement, approval, deployment, operation/licensing, to retirement, while ensuring compliance wit...
...ManagerLocation: Brussels, BelgiumFull time on-site: YES Total Scope of the request (hours): 836Required Start Date: 09-FEB-2026End Contract Date: 31-DEC-2026Required Security Clearance: NATO Secr...
...Manager to support some of the top Belgian brands on Amazon and across Europe.This role provides a real opportunity to develop original ideas, approaches, and solutions. You will work autonomously, wi...
...Security or relevant work experience in IT Security. ISO 27K lead auditor or Lead ImplementerServiceNow GRC certification is a plus.Data Privacy and Information Security Certifications are valued incl...
...Security: The NCIA provides advanced cybersecurity solutions to protect NATO's communication networks and information systems against cyber threats.Command and Control Systems: The NCIA develops and m...
...Manager will operate with considerable autonomy and initiative. The incumbent is responsible for the end-to-end management of complex Communication and Information Systems (CIS) projects within the NA...
...information systems security concepts and current information security trends and practices including security processes and methodsExperience with DevOps tools is considered as a plusDesired/Preferre...
...security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber securit...
...Information Technology;Proven success as an operational, technical team lead and service manager;Familiarity with military telecommunications and information systems; VLF to Satellite EHFMember of a r...
...security to specialist technical accreditation and training and capitalize on rapidly evolving technologies and changing business models. For more information visit www.exclusive-At Exclusive Networks...
...Information Security technologies, infrastructure, processes and services in domains especially IAM.
...information systems security concepts and current information security trends and practices including security processes and methodsExperience with DevOps tools is considered as a plusDesired/Preferre...
...SECURITY CLEARANCE (PSC)The requested level of security clearance for this post is: SECRET UE/EU SECRET. A description of the EU classified information levels is available under Article 2 of Annex A o...
...Information Security Policies (ISP and ISMP) at all times. Microsoft Business Solutions Overview Your long-term future is every bit as important to our client as it is to you. That's why their aim is ...
...Information Security & Cyber Security and you act accordingly. Within Peripass we see these aspects as fundamental to our business, since our software automates critical parts of our clients' logistic...