...program.Assist in reaching or maintaining compliance to information security legal, contractual, or internal requirements.Assist IT teams with the implementation of projects acting as an interim secur...
...program.Assist in reaching or maintaining compliance to information security legal, contractual, or internal requirements.Assist IT teams with the implementation of projects acting as an interim secur...
...project management approach (project planning tools, project reporting, project management methodology, project risks management, etc) Manage risk & issues: continuous follow-up of risks and issues, i...
...Project Management or Program ManagementYou have a very good knowledge of project management tools among others: MS Project, Clarity, Jira, SAPYou can meet project deadlines and provide high quality d...
...management frameworks, such as ISOseries, NIST, ISF, CIS and NIS2 Directive.Experience in multiple security domains (Risk Management, Governance, Network and Application security, Vulnerability Manage...
...programming language Insure the well understanding of all the requirement Translate the functional and business analysis in programming language and architecture Study and discuss the functional analy...
.../or English Project context As part of a major digital transformation initiative, the company is replacing its legacy ERP system to a New ERP. The Domain Leader - Procurement, Supply, and Data Managem...
...//jobs.tvh.com/nl-BE/tvh-jobs-every-single-part-counts https://www.tvh.com/nl-be
...management, phishing campaigns or identity and access management is considered a strong plusExperience or academic exposure to scripting/coding or programming languages (e.g., Java,Python, JavaScript)...
...program DIOR we are looking for an agile technical resource that is also skilled in solution design. The programs deliverables are mobile apps, cloud backend in Azure, Web interfaces and integration w...
...management topics, understanding the value for insurance companies to control risks along their processes.You have established project management skills and ability to coordinate various stakeholders....
...management, phishing campaigns or identity and access management is considered a strong plusExperience or academic exposure to scripting/coding or programming languages (e.g., Java,Python, JavaScript)...
...program. Assist in reaching or maintaining compliance to information security legal, contractual, or internal requirements. Assist IT teams with the implementation of projects acting as an interim sec...
...project management approach (project planning tools, project reporting, project management methodology, project risks management, etc) Manage risk & issues: continuous follow-up of risks and issues, i...
...project management approach (project planning tools, project reporting, project management methodology, project risks management, etc) Manage risk & issues: continuous follow-up of risks and issues, i...