...ities: Lead architecture and migration projects from on-prem VMware to Azure VMware Solution (AVS) for enterprise clients. Work closely with application, infrastructure, and security teams to define a...
...ities: Lead architecture and migration projects from on-prem VMware to Azure VMware Solution (AVS) for enterprise clients. Work closely with application, infrastructure, and security teams to define a...
...ity & security. Build data pipelines, optimise databases, and ensure data quality and security, enabling efficient data access and usability. Cross-department collaboration . Collaborate with business...
...ité IT et OT des entreprises et organisations gouvernementales : depuis l'audit, la définition de stratégie cybersécurité, la conception et la mise en œuvre de solutions à partir d'outils du marché ou...
...ité IT et OT des entreprises et organisations gouvernementales : depuis l'audit, la définition de stratégie cybersécurité, la conception et la mise en œuvre de solutions à partir d'outils du marché ou...
...ité IT et OT des entreprises et organisations gouvernementales : depuis l'audit, la définition de stratégie cybersécurité, la conception et la mise en œuvre de solutions à partir d'outils du marché ou...
...ité collaborative, où experts et clients avancent ensemble pour anticiper les menaces et sécuriser les infrastructures critiques et les systèmes embarqués. Notre ambition : devenir l’acteur de référen...
...ités, pingFederate, en ID Sécurité : Sécurisation AD, antivirus, Endpoint Security... Collaboration : Migration Office 365, Teams, Mise en œuvre de Teams meeting room, User Adoption Transformation du ...
...security architecture and high-level policies and controls towards security requirements (secure by design) for business and IT projects. Define security requirements and penetration test scope, activ...
...security architecture and high-level policies and controls towards security requirements (secure by design) for business and IT projects. Define security requirements and penetration test scope, activ...
...security architecture and high-level policies and controls towards security requirements (secure by design) for business and IT projects. Define security requirements and penetration test scope, activ...
...security architecture and high-level policies and controls towards security requirements (secure by design) for business and IT projects. Define security requirements and penetration test scope, activ...
...security architecture and high-level policies and controls towards security requirements (secure by design) for business and IT projects. Define security requirements and penetration test scope, activ...
...itiatives without compromising quality or delivery timelines. ✔ Risk Management: Anticipate and mitigate supply chain risks to ensure business continuity. ✔ Cross-Functional Collaboration: Work with e...
...ités. Bonne maîtrise des normes de sécurité et des cadres réglementaires (Normes ISO, NIST, etc.). Les certifications en sécurité (CISSP, CompTIA Security+, etc.) Intégrer SQUAD en France ou à l’étran...