...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...
...security, storage, networking waarbij ook cloud componenten mee in rekening worden gebracht;Je bent in staat om meerdere oplossingen kritisch te evalueren, brengt de haalbaarheid alsook de kosten in k...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...Security en Safety industrie te leiden. Om dit doel te bereiken, ontwikkelen we nieuwe security-oplossingen voor onze klanten. We willen meer op maat gemaakte, predictieve oplossingen aanbieden die he...
...Manager in implementing the ODOO ERP System.With the ERP Project Manager & community of practice, lead on developing business need based dashboard using Power BI.Set up the ICT&S Budget, approves and ...
...Security (recommended). Proficiency in English, French, and Dutch. Proficiency in standard office tools (Word, Excel, MS Project Powerpoint). ITIL V3 and PRINCE2 Foundation or PMI certification. Knowl...
...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...
...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...
...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...
...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...
...Security: from product security (code reviews, security patches) to system administration issues (pentesting, best practices, etc.).After 3 weeks of initial training (both functional & technical), we'...
...Manager die gebeten is door de IT-microbe, een leergierig en ambitieus persoon die zin heeft om mee te groeien. Jouw rol Als Project Manager ben je verantwoordelijk voor het plannen, coördineren en su...
...Manager Design and implementation of complex Linux and Windows server environments (AD, DNS, DHCP, GPOs, IIS) Windows domain administration including identity and access management (IAM) Implementatio...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...
...security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments.U...