digital world, as the largest telecommunications company in the Netherlands they make digital possible and and will own the AWS platform in every aspect: security, cost, access, improvement, services, solution update new/existing services and solutions that are secured, scalable, and meet the guidelines You are answerable risks related to cloud infrastructure, such as security vulnerabilities or performance bottlenecks Interacts lessons up until company requirement where your partner can join lessons for free. Company laptop. Commitment
ong>
ong>
and maintain the company's private and hybrid cloud environments in line with company's Cloud Strategy of roles and responsibilities Contribute to the company Culture building initiatives (e.g. staff surveys skills needed Advanced database management and security best practices Advanced automation deployments network infrastructure Database Management Computer Security Disaster Recovery & Business continuity standards and maintain the company's private and hybrid cloud environments in line with company's Cloud Strategy
ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools
devices, such as switches and firewalls, to maintain secure and efficient connectivity. Monitor our WAN links performance. Implement and manage information security measures, including antivirus software and endpoint management. Thorough knowledge of information security practices, including endpoint protection and intrusion
ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly disruptions Monitor and analyse network traffic for security threats and vulnerabilities, and take proactive
ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly disruptions Monitor and analyse network traffic for security threats and vulnerabilities, and take proactive
SpecialistSecurity and User Management:
optimizing internal tools and flows, and ensuring security and processes for development and cloud infrastructure high-quality, reusable code.