Candidature facile
11
Date
Options télétravail
Temps de trajet
Méthode de candidature
Langue du job
Compétences
Fonctions
Secteur
Région
Ville
Expérience
Type de contrat
Régime de travail

Critères

Anglais
Le triPertinence
Date
    Options télétravail
      Temps de trajet
      Méthode de candidature
        Langue du job
        1 sélectionné
          Compétences
            Fonctions
              Secteur
                Région
                  Ville
                    Expérience
                      Type de contrat
                        Régime de travail

                          Jobs populaires

                          • IT
                          • Communication
                          • Service de sécurité
                          • Design
                          • Business
                          • Technologie
                          • Consultant/e en architecture
                          • Adjoint/e de vente
                          • Chargé/e de projet
                          • Account Executive
                          • Administrateur/trice des comptes clés
                          • Agent/e d'expansion des entreprises
                          • Architecte Microsoft
                          • Conseiller en sécurité
                          • Consultant/e en sécurité it

                          Afficher plus
                          Anglais
                          Supprimer tous les filtres

                          Date

                          Nouveaux jobs dernières 24h
                          8


                          Temps de trajet

                          Langue du job


                          Anglais
                          84


                          Compétences








                          Fonctions

                          IT
                          40






                          34 résultats pour Account Manager Security à Hove dans un rayon de 30 km

                          Nous avons étendu votre recherche à plus de 34 offres d’emploi similaires.

                          Cyber Security Risk Manager

                          Devoteam
                          Machelen
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          plus
                          Since a few years we are expanding our cybersecurity and AI security team to bring that same trusted, independent perspective to the digital world. Safety can no longer be guaranteed without addressing cybersecurity and AI security. We approach cybersecurity and AI security the way we have always approached safety: independently, rigorously, and from a position of trust. * Deliver OT security consulting, gap assessments, and risk quantification for asset owners, system integrators, and product manufacturers; * Conduct independent cybersecurity and AI security assessments, penetration tests, and third-party risk assessments; * Develop and deliver training on cybersecurity, AI security, NIS2, product security, CRA, and IEC 62443; * 10 years of experience in cyber security domain
                          Since a few years we are expanding our cybersecurity and AI security team to bring that same trusted, independent perspective to the digital world. Safety can no longer be guaranteed without addressing cybersecurity and AI security. We approach cybersecurity and AI security the way we have always approached safety: independently, rigorously, and from a position of trust. * Deliver OT security consulting, gap assessments, and risk quantification for asset owners, system integrators, and product manufacturers; * Conduct independent cybersecurity and AI security assessments, penetration tests, and third-party risk assessments; * Develop and deliver training on cybersecurity, AI security, NIS2, product security, CRA, and IEC 62443; * 10 years of experience in cyber security domain
                          plus
                          On a daily basis the Pricing Analyst collaborates with Account Managers to prepare and land the right deals with different customers in his/her scope. Stakeholder Management: The Pricing Analyst collaborates on a daily basis with Account Managers and other functions throughout our organization. The Pricing Analyst reports into the Pricing Manager, and is as such a part of the Western European Pricing Team. * Taking pricing ownership of assigned accounts in an independent and proactive way * Actively managing the contracts for your account portfolio in collaboration with sales - The ideal candidate is a great relationship builder, and can bring messages in a compelling way, and manages to influence and motivate others in a positive manner.
                          On a daily basis the Pricing Analyst collaborates with Account Managers to prepare and land the right deals with different customers in his/her scope. Stakeholder Management: The Pricing Analyst collaborates on a daily basis with Account Managers and other functions throughout our organization. The Pricing Analyst reports into the Pricing Manager, and is as such a part of the Western European Pricing Team. * Taking pricing ownership of assigned accounts in an independent and proactive way * Actively managing the contracts for your account portfolio in collaboration with sales - The ideal candidate is a great relationship builder, and can bring messages in a compelling way, and manages to influence and motivate others in a positive manner.
                          plus

                          Customer Experience Specialist

                          Intelect Zaventem
                          Vilvoorde
                          Candidature facile
                          Proven experience in customer service, client support, or account coordination - Ability to manage multiple priorities in a dynamic environment.
                          Proven experience in customer service, client support, or account coordination - Ability to manage multiple priorities in a dynamic environment.
                          plus
                          The Manager, External Workforce Operations Fixed Term role is responsible for supporting the contracted resource activities with the external workforce program in EMEA. This role supports the EMEA Snr Manager, External Workforce Leads by ensuring seamless operational execution of the EMEA external workforce. This role provides critical operational execution and oversight across EMEA, enabling Snr Managers to focus on strategic oversight, governance and stakeholder alignment, while ensuring consistent delivery, stabilization and risk management of the force program in EMEA. * Serve as the operational project manager lead for day-to-day external workforce program management activities * Develop strong relationships with the MSP delivery team and their regional account leadership
                          The Manager, External Workforce Operations Fixed Term role is responsible for supporting the contracted resource activities with the external workforce program in EMEA. This role supports the EMEA Snr Manager, External Workforce Leads by ensuring seamless operational execution of the EMEA external workforce. This role provides critical operational execution and oversight across EMEA, enabling Snr Managers to focus on strategic oversight, governance and stakeholder alignment, while ensuring consistent delivery, stabilization and risk management of the force program in EMEA. * Serve as the operational project manager lead for day-to-day external workforce program management activities * Develop strong relationships with the MSP delivery team and their regional account leadership
                          plus
                          Candidature facile
                          Stayclose tocustomerneedsandcollaboratewiththe KA & ISM Manager toturninsightsintotargetedsolutions.
                          Stayclose tocustomerneedsandcollaboratewiththe KA & ISM Manager toturninsightsintotargetedsolutions.
                          NOUVEAU
                          Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure.
                          Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure.
                          plus
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          plus
                          As a Security GRC consultant, you are able to engage with our clients in all industry sectors to scope out their cyber requirements and to deliver on their Governance, Risk and Compliance projects based on your expert advice. You will also support our clients in the development of their security program regarding compliance and data privacy, which includes performing or documenting Framework Assessments; advising on or creating appropriate Policies; and revising, creating, or assisting in the creation of Risk Management, Incident Response, Business Recovery programs. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security.
                          As a Security GRC consultant, you are able to engage with our clients in all industry sectors to scope out their cyber requirements and to deliver on their Governance, Risk and Compliance projects based on your expert advice. You will also support our clients in the development of their security program regarding compliance and data privacy, which includes performing or documenting Framework Assessments; advising on or creating appropriate Policies; and revising, creating, or assisting in the creation of Risk Management, Incident Response, Business Recovery programs. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security.
                          plus
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          plus
                          Candidature facile
                          People and technology are building the next generation of security with us! * Manage incident and escalation processes to guarantee SLA compliance. * Experience: At least 1 year of experience in Project, Service, Contract, or Account Management. * Security technologies (Access Control, Intrusion, CCTV, ICT) and/or Telecommunications (wired/wireless).
                          People and technology are building the next generation of security with us! * Manage incident and escalation processes to guarantee SLA compliance. * Experience: At least 1 year of experience in Project, Service, Contract, or Account Management. * Security technologies (Access Control, Intrusion, CCTV, ICT) and/or Telecommunications (wired/wireless).
                          plus
                          NOUVEAU
                          Candidature facile
                          Administration,reportingandcommunications :You report directly to the Key Account & Sales Manager Veterinary andensure thatadministrative tasks arecompleted correctly andwithin the agreed upontime framesand formats. Your role as Key Contact Manager * Technical skillsdevelopment :You keep your technical knowledge and productexpertiseup to date through internal and external training, reading specialised literature, and activelyparticipatingin meetings with Marketing and the Technical Manager.
                          Administration,reportingandcommunications :You report directly to the Key Account & Sales Manager Veterinary andensure thatadministrative tasks arecompleted correctly andwithin the agreed upontime framesand formats. Your role as Key Contact Manager * Technical skillsdevelopment :You keep your technical knowledge and productexpertiseup to date through internal and external training, reading specialised literature, and activelyparticipatingin meetings with Marketing and the Technical Manager.
                          plus
                          NOUVEAU
                          You focus on managing solutions in the areas of electronic security and critical communications. * You will take charge of situations for which there is no direct order, i.e. you will ensure that the customer receives the best possible service at all times, taking into account their service level agreement (SLA). * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures. * On the instructions of the engineering manager, you will carry out the annual inspection of electrical tools. This Technical Manager ensures that inspections are only carried out by engineers who have a VCA certificate and a BA4 certificate, but above all who pay attention to detail on all the points to be checked in document
                          You focus on managing solutions in the areas of electronic security and critical communications. * You will take charge of situations for which there is no direct order, i.e. you will ensure that the customer receives the best possible service at all times, taking into account their service level agreement (SLA). * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures. * On the instructions of the engineering manager, you will carry out the annual inspection of electrical tools. This Technical Manager ensures that inspections are only carried out by engineers who have a VCA certificate and a BA4 certificate, but above all who pay attention to detail on all the points to be checked in document
                          plus
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, Security/Purview, Power Platform). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity ...
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, Security/Purview, Power Platform). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity ...
                          plus
                          Ensure application security and compliance by implementing identity management (Azure AD/Entra ID) and secure coding standards from the ground up. * Proficiency in building RESTful APIs and gRPC services, with a focus on security (OAuth2, OIDC) and performance.
                          Ensure application security and compliance by implementing identity management (Azure AD/Entra ID) and secure coding standards from the ground up. * Proficiency in building RESTful APIs and gRPC services, with a focus on security (OAuth2, OIDC) and performance.
                          plus
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. The ability to plan integrations and additions across many systems, is what separates the Cloud Database Manager the DevOps Engineer. * The practice manager is your responsible manager * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. The ability to plan integrations and additions across many systems, is what separates the Cloud Database Manager the DevOps Engineer. * The practice manager is your responsible manager * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          plus
                          Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          plus
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          plus
                          Candidature facile
                          •Infrastructure management: Use Infrastructure as code tools to provision and manage test and development environments. •Security and Compliance: Integrate security best practices into the development process, including vulnerability scanning, static analysis, and ensuring compliance with industry standards (e.g., ISO, IEC). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          •Infrastructure management: Use Infrastructure as code tools to provision and manage test and development environments. •Security and Compliance: Integrate security best practices into the development process, including vulnerability scanning, static analysis, and ensuring compliance with industry standards (e.g., ISO, IEC). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          plus
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          plus
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          plus
                          Candidature facile
                          Stakeholder synergy: Maintain a close partnership with Account/Partner Managers, ensuring clear boundaries where they retain ownership of commercial, contractual, and pricing discussions. MissionThe Service Manager at Banqup Group is the strategic owner of service governance and client/partner relationships once they are fully operational on our platform. * Escalation ownership: Act as the primary service escalation owner for live accounts, coordinating resolution paths with Service & Operations and internal stakeholders after the initial project phase. * Critical incident management: Follow up on high-priority cases, including P1 incidents, Privacy Breaches, and Security Breaches, ensuring they are handled with immediate attention. * Proven experience in a Service Manager or IT support role, with a strong understanding of ITIL frameworks.
                          Stakeholder synergy: Maintain a close partnership with Account/Partner Managers, ensuring clear boundaries where they retain ownership of commercial, contractual, and pricing discussions. MissionThe Service Manager at Banqup Group is the strategic owner of service governance and client/partner relationships once they are fully operational on our platform. * Escalation ownership: Act as the primary service escalation owner for live accounts, coordinating resolution paths with Service & Operations and internal stakeholders after the initial project phase. * Critical incident management: Follow up on high-priority cases, including P1 incidents, Privacy Breaches, and Security Breaches, ensuring they are handled with immediate attention. * Proven experience in a Service Manager or IT support role, with a strong understanding of ITIL frameworks.
                          plus

                          Jobs populaires


                          Afficher plus

                          Quel est le salaire moyen pour Account Manager Security à Hove?

                          Salaire moyen par an
                          49.000 €

                          Le salaire moyen pour les emplois Account Manager Security à Hove est de 49.000 €. Les salaires de Account Manager Security à Hove vont de 42.900 € à 60.400 €.