Technical Skills
Advanced administration of Windows, Linux, M365, Hybrid Cloud systems.
Networking skills (e.g. Ethernet, VLAN, TCP/IP, routing, DHCP, DNS, Wi-Fi).
IT security (eg firewall, antivirus, vulnerability management, IDS/IPS, hardening, CIS, OWASP).
Proficiency in DevOps and automation tools: Git, Jenkins, GitLab CI, Ansible, Terraform, Docker, Kubernetes, etc.
Knowledge of virtualization principles (eg VMware ESX, Nutanix, Hyper-V), storage (eg NAS, SAN), backup/restore (eg Veeam, PowerShell/Bash scripts).
Experience in supervision and monitoring (SOC/SIEM, Microsoft Defender, Zabbix).
Database administration (type MariaDB, MSSQL, PostgreSQL).
Expertise en scripting (Python, Bash, PowerShell) (PowerShell, Bash).
IT project management, ITIL best practices.
Training and experience
Significant experience (3 to 5 years minimum) in systems, network and security administration.
Preferred certifications: Cisco (CCNA/CCNP), Microsoft (MCSA/MCSE), security (CEH, CISSP), ITIL, ISO 27001.
Skills
Active directory Level Confirmed Most recent experience This year
cloud security Level Confirmed Most recent experience This year
Cryptography/PKI Level Confirmed Most recent experience This year
DevSecOps Level Confirmed Most recent experience This year
Docker Level Confirmed Most recent experience This year
Certificate management Level Confirmed Most recent experience This year
WAF Management Level Confirmed Most recent experience This year
Kubernetes Level Confirmed Most recent experience This year
Linux Level Confirmed Most recent experience This year
Microsoft Windows Level Confirmed Most recent experience This year
network security Level Confirmed Most recent experience This year
OWASP Top10 Level Confirmed Most recent experience This year
PowerShell scripting Level Confirmed Most recent experience This year
SOC/SIEM Level Confirmed Most recent experience This year
Questions
How do you design a secure network architecture for a hybrid infrastructure? What key hardening techniques do you apply to systems and equipment to minimize risks?
Describe your approach to implementing encryption and cryptography solutions to secure communications and data at rest. What technical challenges do you foresee and how would you overcome them?
When faced with a critical intrusion alert, what are your first technical steps to contain the incident, collect evidence, and investigate the root cause?
How do you ensure effective technological monitoring in the face of new cyber threats? Give a concrete example of how you adapted an infrastructure to strengthen its security posture following the evolution of a threat.
Languages
DutchLevel Nice to have
EnglishLevel Passive knowledge
FrenchLevel Native