Technical SkillsAdvanced administration of Windows, Linux, M365, Hybrid Cloud systems.Networking skills (e.g. Ethernet, VLAN, TCP/IP, routing, DHCP, DNS, Wi-Fi).IT security (eg firewall, antivirus, vulnerability management, IDS/IPS, hardening, CIS, OWASP).Proficiency in DevOps and automation tools: Git, Jenkins, GitLab CI, Ansible, Terraform, Docker, Kubernetes, etc.Knowledge of virtualization principles (eg VMware ESX, Nutanix, Hyper-V), storage (eg NAS, SAN), backup/restore (eg Veeam, PowerShell/Bash scripts).Experience in supervision and monitoring (SOC/SIEM, Microsoft Defender, Zabbix).Database administration (type MariaDB, MSSQL, PostgreSQL).Expertise en scripting (Python, Bash, PowerShell) (PowerShell, Bash).IT project management, ITIL best practices.Training and experienceSignificant experience (3 to 5 years minimum) in systems, network and security administration.Preferred certifications: Cisco (CCNA/CCNP), Microsoft (MCSA/MCSE), security (CEH, CISSP), ITIL, ISO 27001.SkillsActive directory Level Confirmed Most recent experience This yearcloud security LevelConfirmed Most recent experience This yearCryptography/PKI LevelConfirmed Most recent experience This yearDevSecOps LevelConfirmed Most recent experience This yearDocker LevelConfirmed Most recent experience This yearCertificate management LevelConfirmed Most recent experience This yearWAF Management LevelConfirmed Most recent experience This yearKubernetes LevelConfirmed Most recent experience This yearLinux LevelConfirmed Most recent experience This yearMicrosoft Windows LevelConfirmed Most recent experience This yearnetwork security LevelConfirmed Most recent experience This yearOWASP Top10 LevelConfirmed Most recent experience This yearPowerShell scripting LevelConfirmed Most recent experience This yearSOC/SIEM LevelConfirmed Most recent experience This yearQuestionsHow do you design a secure network architecture for a hybrid infrastructure? What key hardening techniques do you apply to systems and equipment to minimize risks?Describe your approach to implementing encryption and cryptography solutions to secure communications and data at rest. What technical challenges do you foresee and how would you overcome them?When faced with a critical intrusion alert, what are your first technical steps to contain the incident, collect evidence, and investigate the root cause?How do you ensure effective technological monitoring in the face of new cyber threats? Give a concrete example of how you adapted an infrastructure to strengthen its security posture following the evolution of a threat.LanguagesDutchLevel Nice to haveEnglishLevel Passive knowledgeFrenchLevel Native