...informationAre you interested in this position, please submit your application including your CV and cover letter, along with an indication of:Your (preferred) monthly gross salary based on fulltime w...
...informationAre you interested in this position, please submit your application including your CV and cover letter, along with an indication of:Your (preferred) monthly gross salary based on fulltime w...
...security policies op, implementeert DLP-maatregelen en information barriers. Hierbij gebruik je Microsoft Purview. Daarnaast beheer je data lifecycle management en train je medewerkers in security bes...
...security in the Alliance for nearly one billion citizens. The NATO Communications and Information Agency (NCIA) and its predecessors have worked tirelessly in providing the means that enable the conne...
...information security, cyber resilience and risk management. They see their customers as partners because trust is the most important factor. By more than 18 years of experience in cybersecurity Consul...
...managers, architects, and engineers who specialize in frontend, backend, and machine learning. Together, you will create highly scalable distributed platforms and tools that will drive innovation and ...
...Information Security Officer (CISO) to lead our cybersecurity efforts. The CISO will report directly to our Chief Risk Officer (CRO) board member, ensuring top-level integration of security into our s...
...Manager – Vessel Traffic Services (VTS) Domain. What will you do? Leadership & Domain Ownership Own and execute the engineering strategy for all VTS-related products, platforms, and capabilities. Own ...
JobID=1c Is innovation in your DNA? Do you operate with security as a priority? Do you know what it means to create trusted scalability for our software?If all of this sounds exciting while tinkering ...
...InformationThe TeamYou have a passion for taxes; our organization has a real passion for cybersecurity. You’re looking for a career with a more fulfilling mission. We have open positions to top talent...
...Security Strategie & Architectuur: Je ontwikkelt en beheert de algehele (cloud) security strategie en architectuur voor het Spadework‑platform (draaiend op GCP). Beleid & ISMS: Je bent verantwoordelij...
...Information Security Management; including authoring security designs, developing disaster recovery plans, and conducting security assessments. Knowledge and practical experience in designing cloud‑na...
...security is integrated into all processes. Conduct security awareness training and promote a culture of cybersecurity. Monitor and report on security performance and risk to senior leadership. Manage ...
...managers, and suppliers to ensure the ergonomic integrity of all systems, from design concept to implementation. Your expertise will directly contribute to the performance and well-being of those oper...
...managers, and suppliers to ensure the ergonomic integrity of all systems, from design concept to implementation. Your expertise will directly contribute to the performance and well-being of those oper...