Stage: automatiseren van security reports met Generative ... AD

...security reports met Generative AIEen uitdagende stage waarin je de nieuwste ontwikkelingen op het gebied van Generative AI en...Read MoreMicrosoft Security ConsultantAs a Microsoft Security Consultan...

Senior Portfolio Manager AD

...security and compliance across all initiativesEnable the successful delivery of a multi-year, multi-project transformation roadmapCentralize, consolidate, and communicate project data for maximum impa...

Integration Solutions Architect

...security and scalability. Develop the value case, vision and ambition and governance for API management.Stay current with emerging integration technologies and patterns (e.g. API Management, OT/IT con...

NET Software Developer

...security of a long-term contract and a stable source of income while getting the opportunity to work at diverse projects.Individual profit sharingFull transparency. That's it. For each of your project...

Senior Application Architect

...security with OAuthStrong ability to abstract, conceptualize, and propose technical improvementsProfileWe're looking for someone who combines technical excellence with strong communication and leaders...

Python Back-End Developer

...security and integrity of sensitive health data, with a strong focus on regulatory compliance (HIPAA, GDPR).Continuously enhancing the performance, reliability, and maintainability of our back-end sys...

Devsecops Engineer

...security throughout the entire software development life cycle. This includes integration of automated security testing and pipeline security;Implement infrastructure as code (IaC) practices using Ter...

Microsoft Security Consultant

...securitykennis.Jouw ProfielHands-on ervaring met Microsoft security-oplossingen (vooral Entra en Defender).Kennis van producten zoals Purview, Sentinel en Azure Security is een plus.Vertrouwd met secu...

Infrastructure Architect

...security best practicesDeep understanding of authentication systems and user communities (AD, LDAP, OAuth2, OpenID, FAS)Knowledge of containerization systems and orchestrators: OpenShift (and potentia...

Head of Supply Chain Management

...security, defense and protection of people and assets around the world. Each day, millions of people are at work in the trust that PRÆSIDIAD products are protecting their lives and livelihoods from do...

Loan Operations Officer

...security structures .Proficient in MS Word & Excel .Comfortable reconciling figures and working with extensive documentation.Soft Skills: Rigorous, detail-oriented, process-driven, organized, proactiv...

Payroll Specialist

...security, etc.).Reconcile payroll data and review provider outputs to ensure correct processing of starters, leavers, absences, and variable inputs.Manage payroll-related queries through the People Po...

Java Developer AD

...security, reliability, and scalability of existing applications.Apply Agile and DevOps principles in development and operations.Contribute to guidelines, best practices, and technical documentation.Ex...

Forensics Analyst AD

...security agency, or the armed forces, particularly in cyber incident management or digital investigations.•  Strong understanding of sensitive contexts (defense, homeland security, critical infrastruc...