...it as important to our client as it is to you. That’s why their aim is to give you experiences that will stay with you for a lifetime. Whether it’s great training and development, mobility opportuniti...
...IT AWS/Azure Architect TOGAF (Enterprise Architectuur) ITIL (IT Service Management) CISSP of CISM (Security) VMware Certified Professional (VCP) CCNP/CCIE (Netwerkbeheer) Ervaring met complexe organis...
...ith traditional network centric controls /li liImplement and use cloud native tools like Log Analytics, Azure Monitor, Azure Security Center and Azure Sentinel /li /ul h3Who will you work with? /h3 pY...
...ity so we can iterate faster as the product grows. Comfort with Math/Science Code: You will work closely with complex research output (NumPy, OpenCV). While you won't focus on inventing the algorithm...
.../b, and it’s the people we empower with tech. Now, with responsible AI, we’re ready to unlock a future where technology drives positive change. /p h3Job Description /h3 pbDevoteam Creative Tech /b is ...
...ity best practices. Act as a subject matter expert (SME) for Azure security. Digital: Cloud Security Management Cyber Security 7–10+ years in IT security, with at least 3–5 years in cloud security arc...
...ith experience in high‑quality microservice architectures and high‑performance team leadership who also have deep familiarity with Linux kernel, virtualisation, storage and networking. LXD components ...
...ity strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including...
...ity control processes, and governance frameworks (FAIR principles) to ensure data integrity, reliability and reusability across all VIDRU research initiatives, from lab bench to final analysis, in col...
...ith experience in high‑quality microservice architectures and high‑performance team leadership who also have deep familiarity with Linux kernel, virtualisation, storage and networking. LXD components ...
...software into their skillset /li liPromotes the Values of our company /li liGood communication skills /li liA University graduate with relevant degree within a computing or business discipline; /li li...
...ity control processes, and governance frameworks (FAIR principles) to ensure data integrity, reliability and reusability across all VIDRU research initiatives, from lab bench to final analysis, in col...
.../li liCybersecurity risk assessment and remediation, preferably using the EBIOS Risk Manager methodology. /li liThreat modelling. /li liSystem, software and/or hardware security architecture definitio...
...software and/or hardware security architecture definition and/or review, including domain-specific technical documentation.bro Source code review and coding rules definition for C/C++, Java and/or Rus...
...iting counter-drone technology startups Chance to make a real-world impact with your work Close-knit team with low ego, high trust, and a strong sense of purpose Flexibility where it matters (hybrid w...