We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
No cookies to display.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
No cookies to display.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
No cookies to display.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
No cookies to display.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
No cookies to display.
Filters
Incident Analysis and Response, Cross platform Log analysis, Security vulnerability assessment (Qualys, Nessus, Kenna), Malware Analysis, Digital forensics (Encase, Autopsy), SIEM (Splunk, LogRhythm),
Threat Hunting, DDos protection service (Akamai), Cloud monitoring (Azure, AWS), Email filtering, Web Email filtering, Microsoft Security Suite
IT Service Management, Networking design, Antivirus system, Linux Server, Network Troubleshooting, Hardware, Office administration, Printer support, Windows Server, Android Support, iOS Support, WLAN, Windows, Acess point, IP telephone & CUCM, Switch configure
An experienced Network Admin & Cyber Security Analyst having skills in Active Directory, MS Office, Troubleshooting, Network & System Security, VPN, OTDR, Fiber Optic Termination & splicing, Windows, Linux, Firewall configuration, Routing & Switching, Penetration testing, Virtualization Servers, Wordpress Development.
An expert in IT auditing (both internal and external) with hands on experience in information and cyber security, IT Security Governance and compliance domains which span across various industries including technology outsourcing, software development, banking and finance
Highly skilled Systems and Network Engineer with expertized in Cisco Routing & Switching, Meraki & Cisco Wireless, Palo Alto Firewall and F5 LTM, Infrastructure Troubleshooting, Infrastructure Designing, Problem Solving, OS Administration (Windows & Redhat), Hardening (Hardware, OS), Visualization (VMware, HyperV, Fusion Compute & Docker)
Reading: Master's degree | Vulnerability Assessment & Penetration Testing, Secure Code Review, SAST/DAST, Reverse Engineering, Malware Analysis & Digital Forensics, Network & Endpoint Security Monitoring, IDS/IPS, Firewall, WAP, SIEM, Honeyports | IDS/IPS/ Firewall | Kali Linux, Acunetix Web Vulnerability Scanner | OWASP, PTES, ISO 27001, PCI DS
SIEM Monitoring, CB Monitoring, working with WAF and Mail Gateway, Internal VPN handling, Internal AV Monitoring, investigate security breaches and other cyber security incidents, Engage to Ongoing Implementation for a DLP Solution
Software Deployment, Incident Response Management, Cyber framework Knowledgeable, Intrusion Test Oversight SIEM Knowledgeable, VM Management, Wireshark Software, Designing Software controls, Penetration Tester
An Experienced IT Security Engineer with experience in MDM, Firewall, Anti-virus, WAF, Email Gateway, Networks, Vitualization and Cloud, IT Security Tools and Languages.
Met trots stellen wij onze mensen aan jou voor, hoogopgeleide Engelstalige IT’ers. Wie is het meest geschikt voor jouw opdracht?
Ru Métiers beschikt over een pool van toppers, die op afstand operationeel zijn, soms intercontinentaal en vlot beschikbaar. In onze databank presenteren wij meer dan 1200 profielen van kwalitatief sterke IT-professionals.
Wij nemen met voorrang contact met jou op.