...security protocols. Act as the primary point of contact for customers regarding product security matters. Your profile: Proven experience in security management, preferably in a manufacturing or IP‑se...
...security practices;Design and development of .NET-based solutions, including backend APIs, workflow/process engines and cloud-native components;Collaborate with product owners, business stakeholders a...
...security incidents.Culture & AwarenessImplement security awareness and training programs to educate employees about cybersecurity best practices.Organize security drills and tabletop exercises to test...
...Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security incl...
...security, and performance. By analysing customer needs and translating them into robust data models and frameworks, you’ll deliver solutions that turn data into actionable insights. Leveraging your ex...
...securityprocedures in functie van specifieke klantvereisten• Sensibiliseren van medewerkers en implementeren van security awareness trainingen• Implementeren van securityvereisten voor subcontractors ...
...security en gebruiksgemak. Sparringpartner voor analyse en implementatie: je adviseert analisten over technische mogelijkheden en implementeert applicaties die naadloos aansluiten op de functionele no...
...security legislation in Belgium, France, Germany and/or UK is an asset. • Customer oriented and proactiveExcellent command of office tools (MS Office 365) and have in particular advanced knowledge of ...
...security, reliability, and productivity into our solutions. You will pave the way for AI innovations, cloud adoption, and digital transformation using Microsoft Azure’s suite of virtual machines, stor...
...security • Stay up to date with trends in system integration, DevOps, and enterprise AI • Share your insights, challenge assumptions, and actively shape how the team evolves and improves What’s it lik...
...security-plan. - Het ontwikkelen, onderhouden en communiceren van policies, standaarden en processen rond ICT security en compliance. - Het operationeel opvolgen van security-incidenten, inclusief cri...
...security, performance, scalability, and maintainability. Support development teams throughout the implementation lifecycle. Prepare architectural documentation and present solution decisions to stakeh...
You understand risk organizations and the three lines of defense. On top you're familiar with GRC topics and tools like SAP GRC or ServiceNow GRC. You help clients monitor and manage security & compli...
...Security – “proactief risicobeheer en compliance" IT risk management framework beheren (identificatie, analyse, opvolging). Security policies, controls en compliance bewaken (ISO, NIS2, DORA). Risk as...
...Security, and business stakeholders.Risk awareness (operational, security, compliance) to identify gaps in SLAs, IP clauses, or technical requirements.Vendor performance monitoring abilities to track ...