...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Manager, you will own the end-to-end execution of our global activations of Belgium. You will lead each activation project, optimise resources across dozens to twenty of concurrent events, and act as ...
...Manager, you will own the end-to-end execution of our global activations of Belgium. You will lead each activation project, optimise resources across dozens to twenty of concurrent events, and act as ...
...manager, Data Architect, Program manager, business stakeholders to ensure alignment across application, data, and integration perspectives; ensuring decisions are documented and actionable.Enable gove...
...security clearance.3+ years in project management or service delivery management in cyber security.Extensive technical background in penetration testing and offensive security.Demonstrated understandi...
...Security: The NCIA provides advanced cybersecurity solutions to protect NATO's communication networks and information systems against cyber threats.Command and Control Systems: The NCIA develops and m...
...Manager – Public Objective:In this key role, you will manage and motivate a team of Regional and Major Account Managers and drive direct sales into Public Sector Accounts. Create and implement strat...
...Manager, you will support experienced Project Managers in:Coordinating the project and all stakeholders involved (externals and internals),Carrying out administrative, legal, financial and technical a...
...manager, but sometimes you'll be the most senior person on shift and will give people the direction they need to complete their tasks. At other times, you'll support your Shift/Area Manager in plannin...
...security policy.· May perform other duties and responsibilities as assigned.JOB QUALIFICATIONSKNOWLEDGE REQUIREMENTS· Ability to work with mathematical concepts such as probability and statistical inf...
...security tools such as Identity and Access Managment and OT security toolsExperience working in a fast paced CICD environment with tools like Jenkins, GitHub, Bitbucket and ArtifactoryExperience worki...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen ~§ Analyseren van Security Events : Actief opvolgen van meldingen, alerts en k...
...Security componenten (Defender for Endpoint, Defender for Cloud, Defender for Identity,…)§ Security checklisten doorlopen § Analyseren van Security Events : Actief opvolgen van meldingen, alerts en kw...