...Managers at Umicore work on projects that are as exciting as they are challenging. R&D experts develop the technologies that address issues from clean mobility to resource scarcity. As anyone at Umico...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments. ...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments. ...
...InformationSecurityManager is toimplement and develop the company’s information security strategy to safeguard the organization from potential threats(I.e. cybersecurity threats)andensure compliance w...
...Information Security Manager you will take charge of guaranteeing Lotus Bakeries' compliance with the NIS2 regulations and ISO 27001 security standards. Join us at Lotus Bakeries and embark on a thril...
...InformationSecurityManager is toimplement and develop the company’s information security strategy to safeguard the organization from potential threats(I.e. cybersecurity threats)andensure compliance w...
...Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Global Information Assurance Certification (GIAC), ISO27...
...Information Security, or a related field Professional certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Inform...
...Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Global Information Assurance Certification (GIAC), ISO27...
...Security Officer, you will be responsible for improving and maintaining our Information Security Management System. You will be the link between our external security partner(s) and all involved inter...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...Manager will be: Manage the SAP Basis support team in areas such as; development of customer support processes, technical planning and work coordination You are responsible for the recommendation of r...
...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...