...security, and environmental impact.Report to the infrastructure manager and collaborate with cross-functional teams. Bachelor's or Master's in industrial engineering, electromechanics, or related fiel...
...security, and environmental impact.Report to the infrastructure manager and collaborate with cross-functional teams. Bachelor's or Master's in industrial engineering, electromechanics, or related fiel...
...security, and privacy to unlock the full potential of intelligent systems. We’re looking for a Manager who’s ready to take ownership of this challenge—shaping go-to-market strategies, engaging clients...
...Security / IT & Cyber Risk Management Strong experience in Third-Party IT & Security Risk Assessments Solid knowledge of Information Security and Risk frameworks (ISO 27001, NIST, SOC, OWASP) Proven e...
...Manager Warehousing Responsible for the day-to-day operations of the Ordering, Goods Receiving and Warehousing /inventory activities; Responsible for the quality & Security control of incoming goods/m...
...Manager Location: Belgium / Cork / Belux Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fuelled by decades of security expertise, global thre...
...security incidents. Culture & Awareness Implement security awareness and training programs to educate employees about cybersecurity best practices. Organize security drills and tabletop exercises to t...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen § Analyseren van Security Events : Actief opvolgen van meldingen, alerts en kw...
...Security by Design – Continuous Security Integration (DevSecOps) Maintain and evolve vulnerability scanning tools (source code, libraries and dependencies, Docker images). Implement automated security...
...manager, Data Architect, Program manager, business stakeholders to ensure alignment across application, data, and integration perspectives; Enable governance by helping establish processes (architectu...
...manager, Data Architect, Program manager, business stakeholders to ensure alignment across application, data, and integration perspectives; ensuring decisions are documented and actionable. Enable gov...