...Security incident management Application security Security (pen)testing Cloud security Beveiliging van endpoints Identiteits- en toegangsbeheer Netwerkbeveiliging Emailbeveiliging Vereisten: Bachelor-...
...security.Hun expertise eenheden zijn dagdagelijks bezig met op maat gemaakte veiligheidsvoorstellen.Zo bieden zij sluitende security-oplossingen voor bedrijven, overheidsinstellingen en particulieren....
...Manager (Compliance & Safety).Als Senior Product Manager – Operational Compliance & Safety binnen de afdeling Airport ICT beheer je alle ICT-producten binnen het domein van Operational Compliance and ...
...Security Officer, you will be responsible for improving and maintaining our Information Security Management System. You will be the link between our external security partner(s) and all involved inter...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security requirements; Assessing the security maturity of clients (using the ISO or NIST standard) to identify gaps and areas for improvement; Developing and implementing a fit-for-purpose security pr...
...Security Manager you will take charge of guaranteeing Lotus Bakeries' compliance with the NIS2 regulations and ISO 27001 security standards. Join us at Lotus Bakeries and embark on a thrilling journey...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security controls, including:Access control, including user account lifecycle. Active Directory security. Entra ID security. Azure Cloud infrastructure security. Email and Teams communication security...
...security strategy with solid security policies; protocols and procedures across enterprise security architecture, security operations center, datacenter security, and network security including cloud ...
...Security Operations Center, over Security Architectuur tot Risk & Compliance, het Service center IT Security bundelt alle IT Security Services van Colruyt Group. Als juni...
...Manager méthodologique qui participe au développement et à la diffusion d'architectures, de normes et de procédures de référence et veille à leur application dans les projets.Suivre l'évolution des st...
...Security en Safety industrie te leiden.Om dit doel te bereiken, ontwikkelen we nieuwe security-oplossingen voor onze klanten.We willen meer op maat gemaakte, predictieve oplossingen aanbieden die het ...