...Security; Knowledge of enterprise architecture frameworks such as TOGAF, COBIT, Zachman, and actual experience developing and building models based on such framework; Knowledge of enterprise architect...
...security. You will coordinate incident and change management, monitor compliance with SLAs, and manage external suppliers. Candidates should have a bachelor's degree in ICT or related fields, at least...
...security systems, troubleshooting issues, and implementing solutions Your profile Master's degree in engineering (industrial, civil, bio-engineering, or electrical/electronic engineering) Fluent in Du...
...security—we are part of a network of top-class IT security providers that combine expertise, experience, and resources into a unified force for holistic security strategies. Our projects serve both lo...
...Security & Compliance Working out a vision Assist other project stakeholders in capturing system requirements. Define and document the architecture by describing the architectural decisions and views ...
...security services in at least one major cloud provider (Azure, AWS, or GCP), such as: Azure Cloud Security, AWS GuardDuty or GCP Security Command Center. Understanding of cybersecurity frameworks and ...
...security policies en procedures. Up-to-date blijven met de laatste ontwikkelingen op het gebied van cybersecurity en het proactief voorstellen van aanpassingen op basis van nieuwe dreigingen en techno...
...security, encryption, access control, and compliance standards Work closely with application, DevOps, and cloud infrastructure teams Participate in incident, problem, and change management processes A...
...security principles; Support the Agile release train with strategic direction and architecture guidance; Analyze and assess solution requirements within an enterprise context. Your Profile 5+ years of...
...security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. All of this is built on four fundamental values th...
...security management systems (ISMS), compliance audits and ensuring security-by-design Interest in AI security developments Familiarity with IT processes based on e.g. ITIL Knowledge of standards and l...
...security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. All of this is built on four fundamental values th...
...security. As a Cybersecurity Consultant, you will be essential in safeguarding client systems from cyber threats. Your role involves troubleshooting security issues efficiently, responding promptly an...
...security en continuïteit Bewaken van servicelevels en end-user tevredenheid Uitbouwen en opvolgen van een robuuste cybersecuritystrategie Zorgen voor risico- en compliancebeheer op groepsniveau Strate...
...Security‑procedures, processen en beleid opstellen en implementeren; Playbooks ontwikkelen voor incident response en crisismanagement; Awarenessprogramma’s opzetten voor medewerkers en klanten; Klante...