We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
No cookies to display.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
No cookies to display.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
No cookies to display.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
No cookies to display.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
No cookies to display.
Filters
Reading: M.Sc. in Cyber Security, Expertise: SO/IEC 27001:2013 Information Security Management System Compliance, General IT controls auditing, Project management, IT Risk Management, BCP and DRP auditing, IT & Business alignment, Vulnerable Assessment and Penetration Testing, Cyber Security Consultation
Information Security/ Cybersecurity Solutions and Implementations, in developing Information security/Cyber security strategies, programs, risk management, security policies, procedures & standards in technically demanding global environments.
Securing network design architecture, systems analysis & development, LAN Administrator, Advanced Cisco network configuration, troubleshooting, routing, switching, access rules, VPN, ... authentication & firewalls, deal with Security threats & establishes appropriate policies & devices, Plan and Design Optimum Core Backbone & Access networks.
Experience On vulnerability assessment, Endpoint Security, ePolicy, Anti-virus programs and customer handling, Capability of working with Linux, Unix and Windows environment, Teamwork and Leadership skills, Hard working (24/7), Interested in Mobile Security, Network Security, Risk Management, Web Security
Metasploit framework, Maltego, Wireshark, Snort IDS, and hping3, Linux-based OS (Kali Linux, Ubuntu) | raspberry pi and routers | Microsoft office, and Libre office | Language & Frameworks: Java,python C, C++,Javascript , PHP, SQL | Tools & Technologies: NetBeans IDE, Visual Code,Eclipse IDE | Concepts: Object Oriented Software Design
An experienced Network Admin & Cyber Security Analyst having skills in Active Directory, MS Office, Troubleshooting, Network & System Security, VPN, OTDR, Fiber Optic Termination & splicing, Windows, Linux, Firewall configuration, Routing & Switching, Penetration testing, Virtualization Servers, Wordpress Development.
Met trots stellen wij onze mensen aan jou voor, hoogopgeleide Engelstalige IT’ers. Wie is het meest geschikt voor jouw opdracht?
Ru Métiers beschikt over een pool van toppers, die op afstand operationeel zijn, soms intercontinentaal en vlot beschikbaar. In onze databank presenteren wij meer dan 1200 profielen van kwalitatief sterke IT-professionals.
Wij nemen met voorrang contact met jou op.