...security, and environmental impact. Report to the infrastructure manager and collaborate with cross-functional teams. Bachelor's in industrial engineering, electromechanics, or related field. Solid ha...
...SECURITY, today Ajax is one of the most awarded security systems in Europe. Ajax Systems production includes four factories, two of which are located in Ukraine, one in Turkey and one in Vietnam. At t...
Looking for a new and exciting temporary role as an Office Manager? Excel Careers and Excel Interim provide multilingual administrative support staff to companies across all sectors, specializing in p...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen § Analyseren van Security Events : Actief opvolgen van meldingen, alerts en kw...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security by Design – Continuous Security Integration (DevSecOps) Maintain and evolve vulnerability scanning tools (source code, libraries and dependencies, Docker images). Implement automated security...
...Security by Design – Continuous Security Integration (DevSecOps) Maintain and evolve vulnerability scanning tools (source code, libraries and dependencies, Docker images). Implement automated security...
...Security by Design – Continuous Security Integration (DevSecOps) Maintain and evolve vulnerability scanning tools (source code, libraries and dependencies, Docker images). Implement automated security...
...Manager to join a a high level client and bridge the gap between cybersecurity operations and the client's business reality. You will be the primary of the contract, ensuring technical excellence is d...
...Security, Care of Individuals, User Experience, Adaptability, Resourcefulness, IT Governance, IT security, Technology, Practicality, Printers, Mobile Devices, Hardware, Organization Skills, Security P...
...Manager to join their dynamic and diverse team for maternity leave cover! Managing office security processes and controls Monitoring and coordinating facilities-related matters Handling insurance-rela...
...Manager, business stakeholders en IT. Wat jij bouwt, bepaalt hoe snel en hoe scherp we data-gedreven inzichten realiseren. Wat je doet Je ontwerpt en bouwt data-architecturen en data-pipelines die sta...
...Manager. He* assists the General Manager in his decisions and contributes to the elaboration and implementation of the strategic objectives of the company. The Director Strategic Development & New Ins...