...security best practices (network policies, pod security); -Ervaring met data science tools (JupyterHub, Mlflow); -Kennis van Kafka / messaging systemen; -Ervaring met Ansible ofvergelijkbare automatio...
...security, privacy, etc.). Deze transformatie is een stevige uitdaging die aandacht en focus vereist. En op hetzelfde moment blijft ook aandacht nodig voor de continuïteit, kwaliteit en doorlooptijd va...
...security forums and seminars and share insights within professional security communities. As a Cyber Security Analyst, you will contribute to shaping Robeco’s cybersecurity strategy while advancing yo...
...security designs (HLD/LLD) en bewaken van de security-roadmap. Vertalen van business-/compliance-eisen naar concrete security-architectuur en -controls (secure-by-design). Implementeren van securityma...
...security. Als Medior IT Security Consultant bij Team EIFFEL ondersteun je klanten bij securityvraagstukken, voer je assessments uit en werk je mee aan beveiligingsoplossingen. Je ontwikkelt je verder ...
...security. Als Medior IT Security Consultant bij Team EIFFEL ondersteun je klanten bij securityvraagstukken, voer je assessments uit en werk je mee aan beveiligingsoplossingen. Je ontwikkelt je verder ...
...security, a Certificate of No Objection issued by AIVD (The Dutch General Information and Security Service) is mandatory. This means you will have to undergo a security screening. Has this job opening...
...Security Senior Managing Consultant in Amsterdam. The role involves advising clients, preparing technical proposals, and leading SAP Security implementations. Applicants should possess a minimum of 8 ...
...security by default” principles. Deliver reusable templates and checklists for infrastructure provisioning. Data Platform Enablement Define standards for data storage, security, quality, and lineage. ...
...security into CI/CD pipelines. Leverage scripting and automation to enhance security operations and streamline processes. What You Bring to the Table Proven experience as a Security Consultant, Securi...
...Security Office, Development and Operations, and multiple Business Technology (BizTech) teams. IT Security Operations team is part of the Development and Operations team. You will work in a flat organ...
...Manager is highly dynamic. In this position you are allocated to our largest and most complex project (F126) to provide practical support and guidance in a risk manager role. As Risk and Opportunity M...
...Security Be familiar with IDC environment safety and asset security management protocols. Strictly follow asset SOPs for asset storage, transportation, movement, decommissioning, and disposal, ens...
...security practices including Pod Security and Network Policies. Experience with service meshes such as Istio or Linkerd. Exposure to cloud platforms including AWS, Azure, OpenStack, or GCP. Contributi...
...security, and protocols—implementing best practices for availability, reliability, and scalability. You have a keen interest in network design, optimization, and emerging technologies in HPC‑based dat...