...manager, security officer of capaciteitsplanner: jij draagt direct en indirect bij aan een soepel verloop van de securitycontrole. Én je speelt een onmisbare rol in het garanderen van de publieke veil...
...security screening is part of the procedure. For more information about the recruitment process you can contact Miguel Ortiz, Recruiter at
...security, and future‑readiness across new and existing applications. Provide technical leadership throughout the project lifecycle, guiding squads and stakeholders from ideation to deployment and supp...
...security, while contributing to a high-tech, fast-growing company. Key Responsibilities: User Support: Serve as the first point of contact for Business IT support requests from Qblox employees, via ti...
...Security : Understanding of infrastructure security best practices and IAM. Performance : Skills in basic system optimization and resource management. Advanced engineering practices System design: Adv...
...Security : Understanding of infrastructure security best practices and IAM. Performance : Skills in basic system optimization and resource management. Advanced engineering practices System design: Adv...
...managers and teams, fostering a high-performing and engaged workforce. Ensure Engineering Excellence: Establish best practices in software development, DevOps, and cloud-native architecture to deliver...
...managers and teams, fostering a high-performing and engaged workforce. Ensure Engineering Excellence: Establish best practices in software development, DevOps, and cloud-native architecture to deliver...
...Security Management System (ISMS). What am I going to be responsible for? Technical Support Provide first-line technical support to employees through the JIRA ticketing system. Diagnose and resolve a ...
...Security Management System (ISMS). What am I going to be responsible for? Technical Support Provide first-line technical support to employees through the JIRA ticketing system. Diagnose and resolve a ...
...security incidents. Conduct operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security anal...
...security incidents. Conduct operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security anal...
...security, cloud and high-performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-powered, end-to-end solutions for all industries. Atos is a SE (Soc...
...security and compliance solutions that meet the highest standards in FinTech. Contributing to architecture, system design, and technical standards across teams. Because the team is small and autonomou...