...architecture, risk mitigation, and "secure by design" principles across projects Conduct risk assessments and define functional security requirements Support security testing, penetration testing, and...
...architecture, risk mitigation, and "secure by design" principles across projects Conduct risk assessments and define functional security requirements Support security testing, penetration testing, and...
...design and implementation of a new Attestation Management System (AMS) as part of the EU-wide eIDAS2 digital identity initiative. This role involves working at the intersection of technology, security...
Cyber Security Technical Advisor – BelgiumFull-Time | Remote-HybridAs our Cyber Security Technical Advisor, you'll help organisations across Belgium design, implement, and optimise secure, resilient e...
...Design (UCD) principles, UX Research methodologies (User interviews, Persona, Journey mapping, Usability tests), Participatory Design practices (Design Sprints, UX Workshops), UX Prototyping Standards...
...Architecture Board et donnez aux architectes un feedback sur l'architecture proposée. De même, vous soutenez les implémentations. Tous les trimestres, vous vous réunissez avec vos collègues dans la co...
...architecture logicielle. Vous comprenez les besoins et fournissez des architectures d'application stables, que vous documentez à l'aide d'outils de modélisation. - En tant que team lead technique, vou...
...Architecture om informatie te verstrekken, analyses uit te voeren, enz. • Informatie en analyses kunnen verstrekken om de besluitvorming van het management te vergemakkelijken en ondersteunen. Je hebt...
...architecture and technology studies, taking into account all aspects related to architecture and technology decisions, such as, but not limited to, user requirements, evolution of technology and stand...
...Design Sessions to build a plan for implementing the solution – governing design in line with customer business goals and their technical environment. Outcome is consensus on solution design and next ...
...design and implement generative AI architectures with retrieval-augmented generation, develop Python-based ML components, orchestrate Azure AI/ML and prompt workflows, evaluate model outputs using key...
...design and implementation of a new Attestation Management System (AMS) as part of the EU-wide eIDAS2 digital identity initiative. This role involves working at the intersection of technology, security...
...design, production, and installation of tailor-made sun protection systems, both indoor and outdoor. With production sites in Belgium, the company stands out for its integrated approach, covering the ...
...design and implementation of a new Attestation Management System (AMS) as part of the EU-wide eIDAS2 digital identity initiative. This role involves working at the intersection of technology, security...
...design and implementation of a new Attestation Management System (AMS) as part of the EU-wide eIDAS2 digital identity initiative. This role involves working at the intersection of technology, security...