...Security, maar bijvoorbeeld ook Vastgoed/Onderhoud en Bewonerscontact, heb je brede zichtbaarheid in de organisatie. Je ziet van dichtbij hoe data beleidskeuzes versterkt en uitvoering in de praktijk ...
Bynder goes far beyond managing digital assets. Our AI-powered digital asset management platform enables teams to conquer the chaos of proliferating content, touch points, and relationships in order t...
If digital transformation, next-generation technology, and growth opportunities excite you, then join our Netcracker Technology team! Our culture and collaborative work environment are the keys to our...
...Security Management Systemen (ISMS) en de ISO 27001 certificering en je volgt ontwikkelingen op het gebied van cybersecurity op de voet. Je werkt zelfstandig, maar weet ook anderen mee te nemen in jou...
...Security Management Systemen (ISMS) en de ISO 27001 certificering en je volgt ontwikkelingen op het gebied van cybersecurity op de voet. Je werkt zelfstandig, maar weet ook anderen mee te nemen in jou...
...Security Management Systemen (ISMS) en de ISOcertificering en je volgt ontwikkelingen op het gebied van cybersecurity op de voet. Je werkt zelfstandig, maar weet ook anderen mee te nemen in jouw aanpa...
...Manager for the Uplift - Authenticate , you will be the architect of how millions of people prove who they are when they pay. Authentication is the highest‑stakes moment in the payment journey. Done p...
...security Effective communicator with both technical and business stakeholders 10+ years technical sales experience in security 15+ years in Software/SaaS/Enterprise technical sales Hands-on experience...
...Security Requirements Candidates must provide evidence of identity, right to work in the Netherlands and employment/education history. Some vacancies may require additional security clearance; further...
We are Nomios’ers At Nomios, we are dedicated to delivering cutting-edge network solutions that drive the success of businesses worldwide. As a leading provider of network infrastructure and security,...
...security requirements. Build and deploy staging profiles using Zebra StageNow , and convert XML profiles for deployment through Intune. Configure essential device settings including Wi‑Fi, VPN, certif...
...Security, monitoring, third party circuits, Cloud connectivity and related services like DNS and DHCP. The global operations, governance and security are carried out under the supervision of the manag...
...security best practices, and participating in DDoS mitigation efforts. Ideal candidates should have solid experience operating production networks, strong network security skills, and a passion for re...
...Security Mngt Vlgs Haagse Meth (DHM Security Management), Security & Recht, Security & Techniek en/of Security Risc Management (Q-Share), HBO/WO bouwkunde of civiele techniek.Je kunt je aanmelden zodr...
...security clearance. #J-18808-Ljbffr