...itor security solutions, standards, and policies in accordance with IKO’s Information Security Framework. Investigates possible security breaches as part of incident management teamAdditional duties a...
...ity architecture covering IT, OT, cloud, and network environments, leveraging Archimate models and functional frameworks.Your Responsibilities include:Develop and maintain security architecture, stand...
...ith MS SQL Server administration and performance tuning.Familiarity with backup/recovery strategies and disaster recovery planning.Ability to troubleshoot connectivity and integration issues with exte...
...itor security solutions, standards, and policies in accordance with IKO’s Information Security Framework. Investigates possible security breaches as part of incident management teamAdditional duties a...
...ity architecture covering IT, OT, cloud, and network environments, leveraging Archimate models and functional frameworks.Your Responsibilities include:Develop and maintain security architecture, stand...
...ith MS SQL Server administration and performance tuning.Familiarity with backup/recovery strategies and disaster recovery planning.Ability to troubleshoot connectivity and integration issues with exte...
...ith clients to resolve incredibly complex cyberthreats.Our CommitmentWe’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission withou...
...ities• Identify ways to reduce costs in IT and business leadership• Evaluate systems for discrepancies or vulnerabilities• Conduct research to find ways to improve operations• Provide business archite...
...ities will include:Design the architecture of the systemSpecify the system by constructing the requirements of itDevelop the systemDo the integration of the systemDecide the orientation of new product...
...its integrated digital ecosystem. You translate enterprise digital ambitions into robust application architectures, global programs and harmonized business processes that enable sustainable growth and...
...ity, hybrid connectivity, identity, segmentation, microservices, and interoperability.Proficient in Python, Bash, PowerShell and advanced pentest tooling (Nmap, Burp Suite, Nessus, Metasploit, Wiresha...
...it. WHO ARE WE?Hi, we are Archers! Nice to meet you. We’re a community of 25 integration architects and analysts within CornerBriX, Belgium’s leading integration community. It’s quite simple: if you l...
...itment ProcessPhone interview with a recruiterOne or more interviews with a Business ManagerClient presentationMission startIn line with its ethical commitments, Audensiel promotes diversity, equal op...
...ith clients to resolve incredibly complex cyberthreats.Our CommitmentWe’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission withou...
...ities• Identify ways to reduce costs in IT and business leadership• Evaluate systems for discrepancies or vulnerabilities• Conduct research to find ways to improve operations• Provide business archite...