...Security– 3+ years
...security, reliability, and scalability of existing applications.Apply Agile and DevOps principles in development and operations.Contribute to guidelines, best practices, and technical documentation.Ex...
...security agency, or the armed forces, particularly in cyber incident management or digital investigations.• Strong understanding of sensitive contexts (defense, homeland security, critical infrastruc...
...Security products?Then be sure to read onBuildings and infrastructure are rapidly becoming a target for cyberattacks. Therefore, the focus of the job will be onensuring cybersecurity of our Security s...
...security systems in collaboration with external partners.Contribute to the creation and maintenance of comprehensive technical documentation.Evaluate technical feasibility of proposed solutions and pe...
...security and scalability. Develop the value case, vision and ambition and governance for API management.Stay current with emerging integration technologies and patterns (e.g. API Management, OT/IT con...
...security of a long-term contract and a stable source of income while getting the opportunity to work at diverse projects.Individual profit sharingFull transparency. That's it. For each of your project...
...security with OAuthStrong ability to abstract, conceptualize, and propose technical improvementsProfileWe're looking for someone who combines technical excellence with strong communication and leaders...
...security and integrity of sensitive health data, with a strong focus on regulatory compliance (HIPAA, GDPR).Continuously enhancing the performance, reliability, and maintainability of our back-end sys...
...security throughout the entire software development life cycle. This includes integration of automated security testing and pipeline security;Implement infrastructure as code (IaC) practices using Ter...
...securitykennis.Jouw ProfielHands-on ervaring met Microsoft security-oplossingen (vooral Entra en Defender).Kennis van producten zoals Purview, Sentinel en Azure Security is een plus.Vertrouwd met secu...
...security best practicesDeep understanding of authentication systems and user communities (AD, LDAP, OAuth2, OpenID, FAS)Knowledge of containerization systems and orchestrators: OpenShift (and potentia...
...Security Strategy, supported by a corporate threat assessment in collaboration with key stakeholders in the organizationAssisting IT or security teams with the implementation of strategic security pro...
...security trends and legislation.Participating in product certifications and audits related to IEC 62443.Providing input for incident response plans and security testing.Setting up automated security t...