An established industry player is seeking a skilled professional to drive business architecture and IT project strategies. This role involves creating models that reflect the organization’s goals, int...
...security monitoring and logging solutions (SIEM, EDR, NDR). Knowledge of container and Kubernetes security best practices. Additional Certifications such as CISSP, CCSP, GCP Professional Cloud Securit...
...Security Engineering in Brussels to set the technical direction for its security engineering program. The successful candidate will lead a team focused on AWS cloud security architecture, encryption, ...
...Security Training Programmes to oversee the design and delivery of training courses. This role involves managing certification of trainers and supporting security managers globally. Candidates should ...
...Security by Design: Integratie van cybersecurity als een kernonderdeel van het ontwerp.AanbodWat er bijkomtJe wordt verloond naar takenpakket, kennis en competenties. Met zorg werken wij een motiveren...
...Security & Compliance Working out a vision Assist other project stakeholders in capturing system requirements. Define and document the architecture by describing the architectural decisions and views ...
Een overheidsorganisatie in Brussel is op zoek naar een ervaren consultant ISO die ons team van informatieveiligheidsspecialisten komt versterken. De rol vereist minimaal een bachelordiploma in een re...
...security through high base salary, performance-related bonus, company car, subsidized public transport, nursery school and restaurant tickets. Employee participation and bonus systems: Various bonuses...
...Security Design & Implementation Define, design, and deploy robust network security strategies. Configure, maintain, and optimize security equipment: firewalls (including Palo Alto), VPNs, WAF, proxie...
...security, conformance & interoperability and content quality to deliver end‑to‑end total quality solutions. Here at Resillion, our culture is based on an ‘if you see something, say something’ attitude...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud‑delivered security,…) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments. U...
...Security, Office of the CIO), alsook met de business stakeholders.Het design, development, en delivery van alle IT solutions. Het verbeteren van het security, DRP/BCP posture van alle IT solutions.Het...
...security, performance, observability Azure : Hands-on experience with Service Bus, Logic Apps, API Management (APIM), Application Insights, Key Vault, Cosmos DB, Azure Functions, Identity & Security (...
...security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. All of this is built on four fundamental values th...
...security, and compliance related to generative AI usage, while actively supporting business teams in adopting AI-driven solutions.The environment is strongly oriented toward the Microsoft ecosystem, l...