...Security Certification in a Security Role or Security Framework (e.g. CISM, CISA certifications, for Certified Information Security Manager and Certified Information Security Audit; Offensive Security...
...Manager and fellow functional support employees;Explore the possibilities of the application and keep track of market development;Work with other departments to produce and maintain technical, user, a...
We're looking for an experienced Program & Portfolio Manager to join our client's leadership team. This role is ideal for someone who thrives on driving strategic transformation, leading high-impact d...
...Security Certification in a Security Role or Security Framework (e.g. CISM, CISA certifications, for Certified Information Security Manager and Certified Information Security Audit; Offensive Security...
...Manager and fellow functional support employees;Explore the possibilities of the application and keep track of market development;Work with other departments to produce and maintain technical, user, a...
We're looking for an experienced Program & Portfolio Manager to join our client's leadership team. This role is ideal for someone who thrives on driving strategic transformation, leading high-impact d...
...Security (IS) Risk Register and challenge risk assessments for identified risks and effectiveness of proposed measures.Follow-up on implementation of IT control catalogue.1LoD Maturity and Risk Cultur...
...security beheer technieken en of raamwerken (bv: ISO27000 series, COBIT for Security, NIST, OWASP, CIS Critical Security Controls for Effective Cyber Defense)Aantoonbare kennis en ervaring via certifi...
...Security Fabric platform can address the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environment...
...Manager, de Project Manager ...je zoekt, op basis van klantvragen, naar oplossingen binnen ons productgamma: camerabewaking, toegangscontrole, branddetectie, inbraakdetectie …je bent verantwoordelijk ...
...Manager for the monitoring of costs, development schedules and associated technical reporting.Support the preparation of product Statement of Work (SOW).Setup and validate proof of concepts by buildin...
...security of employee and property records, files, and information. Ensure accurate maintenance of all employee records and files (e.g., interview documents, I-9's).Follow all company policies and proc...
...Manager, providing continuous guidance and follow-up on the development and implementation of new or enhanced tools/features/integrations..Effective Communication: You will have the ability to transla...
...Security (IS) Risk Register and challenge risk assessments for identified risks and effectiveness of proposed measures.Follow-up on implementation of IT control catalogue.1LoD Maturity and Risk Cultur...
...security beheer technieken en of raamwerken (bv: ISO27000 series, COBIT for Security, NIST, OWASP, CIS Critical Security Controls for Effective Cyber Defense)Aantoonbare kennis en ervaring via certifi...