...ith Group Corporate Functions: -Define functional and technical prerequisites (Cyber Security, Data Protection Officer)-Develop an integration model with Core HR solutions and Finance systems -Establi...
...ith luxury, heritage with innovation, and craftsmanship with design. Administration of IT security tools Participating in the promotion of Cyber Security culture : Organize cybersecurity training sess...
...ith luxury, heritage with innovation, and craftsmanship with design. Administration of IT security tools Participating in the promotion of Cyber Security culture : Organize cybersecurity training sess...
...IT de type CICD GitOps et Infrastructure-as-Code (IaC) avec Github, Ansible, Terraform, Kubernetes, Docker … Vous avez une expertise sur des technologies liées à : CI/CD (GitLab, Gitlab CI, SonarQube,...
...itle - Lead ConsultantType - ContractLocation - RemoteKey Responsibilities:Define:Conduct client assessments to identify needs and opportunities.Advise on IT strategies aligned with business goals.Cre...
...ith Vault, Terraform and Consul. You will be part of the Security teams, which implement new uses for secret management with HashiCorp Vault, develop integration with the different systems consuming d...
...ith Vault, Terraform and Consul. You will be part of the Security teams, which implement new uses for secret management with HashiCorp Vault, develop integration with the different systems consuming d...
...ité SIEM & EDR : Superviser les outils SIEM (Security Information and Event Management) et EDR (Endpoint Detection and Response) pour détecter, analyser et répondre aux incidents de sécurité.Managemen...
...ith IT, legal, and compliance teams to align security practices with business needs and regulatory changes. Continuous Improvement: Monitor evolving cybersecurity threats and proactively adapt securit...
...ith IT, legal, and compliance teams to align security practices with business needs and regulatory changes. Continuous Improvement: Monitor evolving cybersecurity threats and proactively adapt securit...
...ith IT, legal, and compliance teams to align security practices with business needs and regulatory changes. Continuous Improvement: Monitor evolving cybersecurity threats and proactively adapt securit...
...ith IT, legal, and compliance teams to align security practices with business needs and regulatory changes. Continuous Improvement: Monitor evolving cybersecurity threats and proactively adapt securit...
...ith IT, legal, and compliance teams to align security practices with business needs and regulatory changes. Continuous Improvement: Monitor evolving cybersecurity threats and proactively adapt securit...
...ith luxury, heritage with innovation, and craftsmanship with design. Administration of IT security tools Participating in the promotion of Cyber Security culture : Organize cybersecurity training sess...
...ith luxury, heritage with innovation, and craftsmanship with design. Administration of IT security tools Participating in the promotion of Cyber Security culture : Organize cybersecurity training sess...