...security, implementatie van naamconventies, technische documentatie). Je denkt technisch ondersteunend en probleemoplossend mee. Je volgt procedures nauwkeurig, stelt ze op en houdt ze up-to-date. Wel...
...security van het bedrijf op alle niveaus, gaande van endpoint security tot het configureren binnen alle verschillende Cloud SAAS-platformen (Microsoft).Je bent het centrale aanspreekpunt voor alle IT-...
...security or non-functional testingUnderstanding of test strategy or architecture at solution levelBroad technical insight or leadership profile beyond QAWhat we offerA modern IT environment that value...
...security, implementatie van naamconventies, technische documentatie). Je denkt technisch ondersteunend en probleemoplossend mee. Je volgt procedures nauwkeurig, stelt ze op en houdt ze up-to-date. Wel...
...security van het bedrijf op alle niveaus, gaande van endpoint security tot het configureren binnen alle verschillende Cloud SAAS-platformen (Microsoft).Je bent het centrale aanspreekpunt voor alle IT-...
...security or non-functional testingUnderstanding of test strategy or architecture at solution levelBroad technical insight or leadership profile beyond QAWhat we offerA modern IT environment that value...
...security, implementation of naming conventions, technical documentation)Technical support / problem-solving thinkingAccurately follow, draw up and keep up-to-date proceduresWhat profile are we looking...
...Manager for one of our clients. If you're an expert in cybersecurity with a passion for managing complex security challenges and driving innovation, we want to hear from you!Key Responsibilities:-Defi...
...Manager will be arranged. In the case of positive feedback coming from the Hiring Manager interview, the recruiter will contact you for the next steps or to discuss our proposal. Alternatively, if the...
...security, implementation of naming conventions, technical documentation)Thinking along with technical support / problem-solvingAccurately track, draft, and keep procedures up-to-date What profile are ...
...Security), Cisco ISE, Palo Alto, Cato Networks (SASE), Switching & Routing (L2/L3, VLAN, DHCP, DNS, Firewall) Administration système : Windows Server (2008-2019), Active Directory (Multi-Forest, Group...
...Security Implementeren van beveiligingsmaatregelen om gegevens en systemen te beschermen tegen cyberdreigingen. Gebruikersrechten en toegangen beheren Security audits regelmatig uitvoeren Technische O...
...Manager, junior functionals and technical team members. Comparable to internal Product Owner. Requirements Evaluation criteria Proven record of configuring and customizing M365 applications and M365 3...
...security, implementation of naming conventions, technical documentation)Technical support / problem-solving thinkingAccurately follow, draw up and keep up-to-date proceduresWhat profile are we looking...
...Manager for one of our clients. If you're an expert in cybersecurity with a passion for managing complex security challenges and driving innovation, we want to hear from you!Key Responsibilities:-Defi...