...managers and cross-functional teams to ensure timely delivery of solutions. Provide post-deployment support, tuning, and knowledge transfer to client IT teams. Bachelor's degree in Information Technol...
...managers and cross-functional teams to ensure timely delivery of solutions. Provide post-deployment support, tuning, and knowledge transfer to client IT teams. Bachelor's degree in Information Technol...
...managers and cross-functional teams to ensure timely delivery of solutions. Provide post-deployment support, tuning, and knowledge transfer to client IT teams. Bachelor's degree in Information Technol...
...security posture of a significant client. Assist in the day-to-day security operations, including monitoring security systems, analyzing logs, and identifying potential security incidents. Support vul...
...security posture of a significant client. Assist in the day-to-day security operations, including monitoring security systems, analyzing logs, and identifying potential security incidents. Support vul...
...security posture of a significant client. Assist in the day-to-day security operations, including monitoring security systems, analyzing logs, and identifying potential security incidents. Support vul...
...Security Manager. The main mission of the IS Security department is to manage and implement IT security at STIB. We develop, operate and maintain all IT security processes. As an IS Security PKI Archi...
...security posture of a significant client. Assist in the day-to-day security operations, including monitoring security systems, analyzing logs, and identifying potential security incidents. Support vul...
...Security Manager. The main mission of the IS Security department is to manage and implement IT security at STIB. We develop, operate and maintain all IT security processes. As an IS Security PKI Archi...
...security posture of a significant client. Assist in the day-to-day security operations, including monitoring security systems, analyzing logs, and identifying potential security incidents. Support vul...
...security posture of a significant client. Assist in the day-to-day security operations, including monitoring security systems, analyzing logs, and identifying potential security incidents. Support vul...
...security role, with +/- 3 years of experience in NIS 2 & ISO27001. Strong understanding of cybersecurity concepts, network security protocols, cloud security principles, and common attack vectors. Cer...
...security role, with +/- 3 years of experience in NIS 2 & ISO27001. Strong understanding of cybersecurity concepts, network security protocols, cloud security principles, and common attack vectors. Cer...
...managers and cross-functional teams to ensure timely delivery of solutions Maintain detailed project documentation, including designs, configurations, and change logs Provide post-deployment support, ...
...Security Risk Assessment Questionnaires (SRAQ), Technical Architecture Documents (TAD) en Security Risk Acceptance Forms (SRAF) Nauw samenwerken met interne technische leads om benodigde informatie te...