...technology-enabled services that help our customers focus on their everyday business. We're committed to sustainable mobility and have made it a core part of our strategy. In everything we do, we're g...
...information et des communications. Nous recherchons un professionnel expérimenté capable d'assurer la gestion opérationnelle et stratégique des technologies de l'information. Rôles et responsabilités ...
...Information Systems, or related field8+ years of experience in Enterprise Architecture, Solution Architecture, or Technology RiskStrong knowledge of DORA, operational resilience, ICT risk, and cyberse...
...technology-enabled services that help our customers focus on their everyday business. We're committed to sustainable mobility and have made it a core part of our strategy. In everything we do, we're g...
...information et des communications. Nous recherchons un professionnel expérimenté capable d'assurer la gestion opérationnelle et stratégique des technologies de l'information. Rôles et responsabilités ...
...Information Systems, or related field8+ years of experience in Enterprise Architecture, Solution Architecture, or Technology RiskStrong knowledge of DORA, operational resilience, ICT risk, and cyberse...
...information and event management, identity and access management, remote access methods, wireless protocols, and services The role also requires autonomy while being a great team player and fluency in...
...technology, including internal policies and cybersecurity awareness Uphold organizational standards related to data protection, information security, and IT best practices Deliver a consistently high ...
...Information Technology Minimum 5 years experience in IT Infrastructure & Operations within a manufacturing environment ,
Within the Infrastructure's practice together with Paul, embrace your role and be responsible for ensuring security of infrastructure or application technology through the implementation of security s...
...Information Technology Minimum 5 years experience in IT Infrastructure & Operations within a manufacturing environment ,
...technology, including internal policies and cybersecurity awareness Uphold organizational standards related to data protection, information security, and IT best practices Deliver a consistently high ...
...information and event management, identity and access management, remote access methods, wireless protocols, and services The role also requires autonomy while being a great team player and fluency in...
...information and event management, identity and access management, remote access methods, wireless protocols, and services The role also requires autonomy while being a great team player and fluency in...
...technology, including internal policies and cybersecurity awareness Uphold organizational standards related to data protection, information security, and IT best practices Deliver a consistently high ...