OUR VALUES

HUMAN FACTOR ALWAYS COMES FIRST

We provide equal career opportunities to professionals and students in the field. Sending us your CV means getting a step closer to expressing your talent and progressing in your career.

BE PART OF OUR TEAM

CAREER

Apogee's professional environment is based on four pillars:

Passion
We are passionate about new technologies and we accept challenges. Our main goal is to meet our customers needs and to deliver unique solutions.

Personal development
Our mindset is to build long-term relationships with our customers and employees by working together on demanding projects. You will have the opportunity to develop your skills within a team of top IT-professionals and you will be given the opportunity to unfold your skills, improve your talents and progress.

Teamwork
Collaboration is the key to succes. Being part of a multinational team and interacting with other colleagues, we join our forces in order to achieve our goals.

Diversity
Working in a international context, we provide equal career opportunities to all candidates from all over the world and of all backgrounds.
Stockholm
18 November, 2019
1 Years
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automation

The tasks will include: rchitecture and design of information systems. Review of the architecture of existing systems. Establish and maintain the Technical Design. Working closely with the Business Analyst supporting the solution requirement elicitation. Producing technical architectures / designs that are modifiable, dependable and scalable. Translating requirements into conceptual, logical and physical data models. Development and enhancement of architecture. Take part in and support the implementation and testing of the design. Participate in code review activities. Ensure alignment with the High Level Design.   Designing and leading the K2 architecture and development for IT workflow applications Be involved in shaping the architecture of workflow/smartforms solutions  Provide hands on K2 designing, developing and documenting IT applications Provide knowledge of Systems Development Lifecycle (SDLC) concepts for effective development and implementation including disciplined testing of software enhancements and maintenance activities Participate in SDLC with emphasis on the coding, testing and documentation using either Agile Scrum methodology or traditional Waterfall   Qualifications   University degree with minimum 6 years of experience in IT OR non university degree with minimum 8 years of experience in IT. Minimum 3 years of experience of application architecture activities in Microsoft and .Net. Minimum 3 years of application architecture activities in K2. Relevant platform development: Workflow automation in K2. Relevant specialisation and technology/ies: K2 4.7 blackpearl and/or K2 Five (SmartForms, SmartObjects, Workflows), K2 integration with SharePoint, C#, WCF / WebApi, TSQL, and PowerShell. Experience with migrating workflow applications from K2 4.7 blackpearl to K2 Five and experience with Powershell and scripted deployments will be considered advantageous. Excellent English language skills, both written and verbal (C1).

The Hague
13 November, 2019
7 Months
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automationLinuxUnixPuppetNetworkOSRed Hat 6

Development of new modules and roles to meet deployment requirements Maintain the new Linux support infrastructure Apply fixes, plan ane execute the upgrade of Puppet Document all activities, topology, configuration and procedures Support the finalization of the ongoing migration to RedHat 7 Develop new functionality to meet existing demand Support and maintain the existing Linux/ Puppet support infrastructure   Qualifications   Bachelor Degree in IT or related field with a minimum of 7 years of experience in ICT,within at least one organization with more than 200 employees/ end points A minimum of 3 years of experience in Linux/ Unix administration (Red Hat 6+) A minimum of 2 years of experience in Puppet* based configuration development, testing, deployment and management Experience in bash scripting* to support server deployment automation General OS and network knowledge is also mandatory Professional knowledge and experience on the following are desirable; Ruby scripting Microsoft Windows Server 2008/12+ administration Puppet* configuration management on Windows Server 2008/12+ Very good knowledge of written and spoken English is required

Valetta
15 November, 2019
3 Months
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automationLinuxUnixPuppetNetworkOSRed Hat 6MySQLPHPHTMLCSSMicrosoft SQL ServerAJAXJavaScriptRDBMSApacheMoodle LMSMoodle LMS web API

Porting of AWS Moodle LMS to Azure Configuration of the Moodle LMS under the Azure locale   Migration of the LMS MySQL to Microsoft SQL Server   Perform design, configure, customize and implement responsive and effective LMS system Integrate with plugins when required, write scripts to automate Moodle routines and processes Plan and implement API integrations with third parties when required Analyse business processes, and user requirements to establish Moodle improvements  Assist Moodle course manager(s) into delivering increased user satisfaction and ensuring high-quality of services  Support Moodle/PHP implementations and resolve any technical issues Editing and creation of new content and courses in Moodle   Qualifications   Bachelor's degree (3 years) in Computer Science or related field 3+ years of experience in PHP, MySQL, Microsoft SQL Server, JavaScript, CSS, HTML, AJAX, Apache, and Moodle LMS  3+ years of experience in integrating plug-ins and writing new plug-ins to extend the Moodle system core features 3+ years of experience in MySQL and other RDBMS (preferably Microsoft SQL Server) Proven experience developing web services within Moodle Proven experience with Moodle API and integration with third party systems Thorough understanding of various Moodle modules and experience in customizing Moodle functionalities and developing custom themes for Moodle Experience in creating dynamic content and courses in Moodle LMS Experience in Moodle Authentication and Authorization services Implement/maintain multi-tenant scalable Moodle architecture will be an asset Experience using Cloud resource in AWS and Azure will be an asset

Ispra
14 November, 2019
8 Months
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automationLinuxUnixPuppetNetworkOSRed Hat 6MySQLPHPHTMLCSSMicrosoft SQL ServerAJAXJavaScriptRDBMSApacheMoodle LMSMoodle LMS web APIJavaPHPJavaScript

Qualifications   Master's degree & 9-13 years of professional experience after studies Mandatory: Experience in PHP Experience in JavaScript Experience in Java Advantage: Experience in scientific modelling  Knowledge of chemical accident consequence analysis methodologies is an advantage Knowledge of chemical accident consequence models is an advantage Fluency in English

Luxembourg
12 November, 2019
6 Months
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automationLinuxUnixPuppetNetworkOSRed Hat 6MySQLPHPHTMLCSSMicrosoft SQL ServerAJAXJavaScriptRDBMSApacheMoodle LMSMoodle LMS web APIJavaPHPJavaScriptITILPKICobitFirewallsdata protectionProxiesantivirus softwaredata encryptionAuthentication systemse-mail gatewaysIP securityhost intrusion detection and preventionvulnerability assessmenthardening practicesNetwork IDS/IPSdata integrityCisco Firepower IPSICT enterprise environmentshoney-pot

Manage the Cisco Firepower network probes installed in Production and in the Lab. Collaborate with the other teams in the unit to analyse the registered events and solve the possible incident. Select/Define/improve IDS/IPS signatures, policies and triggers . Deploy software/vulnerability/fingerprint updates . Improve detection capabilities by creating Splunk filters. Detect and minimize false positives . Investigate alerts, react, escalate and inform stakeholders accordingly . Possibly plan further expansion of the monitoring system . Write "response instructions" for common situations Production of documentation: for documenting the network monitoring activities, and the associated guidelines and procedures.     Qualifications   University Degree in an ICT related fiel with a minimum of 8 years of professional experience in the domain of ICT and Network Security Excellent knowledge of  Cisco Firepower IPS – ideally 8 years of experience Working experience in complex ICT enterprise environments and in the.associated security aspects. Experience with Splunk is required Excellent knowledge of Operating systems and good practices for their configuration ad protection Excellent knowledge of all kind of network and host security systems including: antivirus software, host intrusion detection and prevention, vulnerability assessment, data encryption, honey-pot, and hardening practices Excellent knowledge of network concepts and the associated security solutions. In particular the following topics must be known: Internet/Intranet/Extranet architectures; Authentication systems, Firewall, Proxies, Network IDS/IPS, PKI, e-mail gateways, IP security, Remote access control and violations, data protection and integrity, Encryption, Viruses Desirable knowledge of IT best practices (ITIL, COBIT, etc.) Very good knowledge of written and spoken English is required. Knowledge of French (B1 or higher) would be considered as asset.   

Luxembourg
13 November, 2019
6 Months
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automationLinuxUnixPuppetNetworkOSRed Hat 6MySQLPHPHTMLCSSMicrosoft SQL ServerAJAXJavaScriptRDBMSApacheMoodle LMSMoodle LMS web APIJavaPHPJavaScriptITILPKICobitFirewallsdata protectionProxiesantivirus softwaredata encryptionAuthentication systemse-mail gatewaysIP securityhost intrusion detection and preventionvulnerability assessmenthardening practicesNetwork IDS/IPSdata integrityCisco Firepower IPSICT enterprise environmentshoney-potPKIFirewallsEndpoint securitydata protectionencryptionProxiesantivirus softwaredata encryptionAuthentication systemse-mail gatewaysIP securityMcAfee Endpoint ProtectionMcAfee Advanced Threat PreventionMcAfee DiskMcAfee Folder/Removable Media encryptionMcAfee Rogue DetectionMcAfee Active Responsehost intrusion detection and preventionvulnerability assessmenthardening practicesNetwork IDS/IPSRemote access control and violationsdata integrity

For working in its operational security team, our client is looking for a candidate having a good mix of the competencies listed, and in particular for performing the following tasks: Monitor the events produced by the Endpoint Security suites installed in Production and in the Lab, on server and workstation environments. Monitor the events produced by other sources like App Locker, other Antivirus, Proxy, etc. etc. Work at the daily tasks for the endpoint protection: Select/Define/Improve policies, signatures and triggers. Improve detection capabilities by creating Splunk filters. Detect and minimize false positives. Perform the first investigations before communicating the possible incident to the reaction team. Possibly inform stakeholders accordingly. Write "response instructions" for common situations   Qualifications   You have minimum 8 years of professional experience in the domain of ICT and Network security  You hold an University degree (minimum 4 years post-secondary education) in an ICT related field. Two years of recent experience in the domain will be considered equivalent to one year of studies. English fluent + French minimum Level B1 desirable You have an excellent knowledge of Endpoint Security suites: McAfee Endpoint Protection, McAfee Advanced Threat Prevention, McAfee Disk, Encryption, McAfee Folder/Removable Media encryption, McAfee Rogue Detection, McAfee Active Response, etc. You have working experience in complex ICT enterprise environments and in the.associated security aspects. You hold an excellent knowledge of Operating systems and good practices for their configuration ad protection You have an excellent knowledge of all kind of network and host security systems including: antivirus software, host intrusion detection and prevention, vulnerability assessment, data encryption, honey-pot, and hardening practices You have an excellent knowledge of network concepts and the associated security solutions. In particular the following topics must be known: Internet/Intranet/Extranet architectures; Authentication systems, Firewall, Proxies, Network IDS/IPS, PKI, e-mail gateways, IP security, Remote access control and violations, data protection and integrity, Encryption, Viruses Desirable knowledge of IT best practices (ITIL, COBIT, etc.)    

Luxembourg
12 November, 2019
5 Months
C#SharepointWCFPowershellT-SQLWebApiK2Workflow automationLinuxUnixPuppetNetworkOSRed Hat 6MySQLPHPHTMLCSSMicrosoft SQL ServerAJAXJavaScriptRDBMSApacheMoodle LMSMoodle LMS web APIJavaPHPJavaScriptITILPKICobitFirewallsdata protectionProxiesantivirus softwaredata encryptionAuthentication systemse-mail gatewaysIP securityhost intrusion detection and preventionvulnerability assessmenthardening practicesNetwork IDS/IPSdata integrityCisco Firepower IPSICT enterprise environmentshoney-potPKIFirewallsEndpoint securitydata protectionencryptionProxiesantivirus softwaredata encryptionAuthentication systemse-mail gatewaysIP securityMcAfee Endpoint ProtectionMcAfee Advanced Threat PreventionMcAfee DiskMcAfee Folder/Removable Media encryptionMcAfee Rogue DetectionMcAfee Active Responsehost intrusion detection and preventionvulnerability assessmenthardening practicesNetwork IDS/IPSRemote access control and violationsdata integrityITILPKICobitFirewallsIDS/IPSdata protectionISO 27000risk assessmentProxiesCybersecurityantivirus softwaredata encryptionAuthentication systemse-mail gatewaysIP security

Writing Cybersecurity best practices, guidelines, standards, and procedures. Keeping up-to-date specific documents and updating the ICT Security webpages in the client Intranet. Perform risk assessments for complex ICT system. Contribute to the activities of the ICT Security Management service. Produce the technological reports and documentation associated to the activities. Exchange with stakeholders on topics related to the security of software and system. Support User Awareness activities. Collaborate with the other experts in the domain for performing the analysis of both global technological trends and specific projects.   Qualifications   You have minimum 8 years of professional experience in the domain of IT security  You hold University degree (minimum 4 years post-secondary education) in an ICT related field. Two years of recent experience in the domain will be considered equivalent to one year of studies. English fluent  French mininimum level B1 will be desirable You have minimum 5 years of experience in Cybersecurity and Information security standards ( e.g. ISO 27000 series). You have working experience in complex ICT enterprise environments and in the.associated security aspects. You hold an excellent knowledge of Operating systems and good practices for their configuration ad protection Excellent knowledge of all kind of network and host security systems including: antivirus software, host intrusion detection and prevention, vulnerability assessment, data encryption, honey-pot, and hardening practices Excellent knowledge of network concepts and the associated security solutions. In particular the following topics must be known: Internet/Intranet/Extranet architectures; Authentication systems, Firewall, Proxies, Network IDS/IPS, PKI, e-mail gateways, IP security, Remote access control and violations, data protection and integrity, Encryption, Viruses Excellent capacity in creating and maintaining security configuration guidelines for systems used by EU institutions (ex: Windows, RedHat, Apache, Tomcat, Oracle, etc.) Very good knowledge of risk assessment methods and standards Very good knowledge of IT best practices (ITIL, COBIT, etc.)  

Submit your CV

Please use the form below to submit your CV

* required fields