Candidature facile
5
Date
Options télétravail
Temps de trajet
Méthode de candidature
Langue du job
Compétences
Fonctions
Secteur
Région
Ville
Expérience
Type de contrat
Régime de travail

Critères

Design
Le triPertinence
Date
    Options télétravail
      Temps de trajet
      Méthode de candidature
        Langue du job
          Compétences
          1 sélectionné
            Fonctions
              Secteur
                Région
                  Ville
                    Expérience
                      Type de contrat
                        Régime de travail

                          Jobs populaires

                          • IT
                          • Design
                          • Communication
                          • Service de sécurité
                          • Technologie
                          • Business
                          • Architecte de sécurité
                          • Ingénieur/e avant vente
                          • Architecte Microsoft
                          • Consultant/e web
                          • Architecte applicatif
                          • Architecte de logiciel
                          • Chargé d'études en organisation et informatique
                          • Chargé/e de mission
                          • Chargé/e de produit

                          Afficher plus

                          Emplacements

                          Design
                          Supprimer tous les filtres

                          Date

                          Nouveaux jobs dernières 24h
                          3


                          Temps de trajet

                          Compétences


                          Design
                          49






                          Fonctions

                          IT
                          37






                          33 résultats pour Cyber Security à Lint dans un rayon de 30 km

                          Digital Identity Cybersecurity Consultant

                          Devoteam
                          Machelen
                          Candidature facile
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise.
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise.
                          plus

                          Security Architect – Privileged Access Management

                          Devoteam
                          Machelen
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * You have a passion for Cyber Security, being the basic ingredient of success. We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. At Devoteam, we believe cyber is about creating a more secure future for our customers.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * You have a passion for Cyber Security, being the basic ingredient of success. We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. At Devoteam, we believe cyber is about creating a more secure future for our customers.
                          plus
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. If you're seeking a career in cyber security, then this opportunity might be right for you. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * You have a passion for Cyber Security, being the basic ingredient of success. We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. At Devoteam, we believe cyber is about creating a more secure future for our customers. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. If you're seeking a career in cyber security, then this opportunity might be right for you. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * You have a passion for Cyber Security, being the basic ingredient of success. We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. At Devoteam, we believe cyber is about creating a more secure future for our customers. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, ...
                          plus
                          Connect-ICT BV * ANTWERPEN - Solliciteer als één van de eersten - Introductie - Ben jij een compliance engineer met ervaring in de industrie ? Zoek je een job waarin je echt het verschil maakt, omringd door collega's die elkaar steunen, inspireren en waarderen? Dan hebben wij de uitdaging die jij zoekt! Voor een toonaangevende klant in de regio haven Antwerpen-Noord is Connect Consulting op zoek naar een Compliance Engineer die klaar is om de volgende stap in zijn of haar carrière te zetten. Je krijgt meteen een vast contract rechtstreeks bij het bedrijf. Dit is dus geen consultancy, maar een vaste functie binnen een hecht team. Ben jij klaar om je expertise in te zetten in een betekenisvolle rol? Dan nodigen wij je graag uit om te solliciteren. Connect Consulting begeleidt je met plezier naar je volgende uitdaging. Taken
                          Connect-ICT BV * ANTWERPEN - Solliciteer als één van de eersten - Introductie - Ben jij een compliance engineer met ervaring in de industrie ? Zoek je een job waarin je echt het verschil maakt, omringd door collega's die elkaar steunen, inspireren en waarderen? Dan hebben wij de uitdaging die jij zoekt! Voor een toonaangevende klant in de regio haven Antwerpen-Noord is Connect Consulting op zoek naar een Compliance Engineer die klaar is om de volgende stap in zijn of haar carrière te zetten. Je krijgt meteen een vast contract rechtstreeks bij het bedrijf. Dit is dus geen consultancy, maar een vaste functie binnen een hecht team. Ben jij klaar om je expertise in te zetten in een betekenisvolle rol? Dan nodigen wij je graag uit om te solliciteren. Connect Consulting begeleidt je met plezier naar je volgende uitdaging. Taken
                          plus
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Cyber Security. * You have a passion for Cyber Security, being the basic ingredient of success. We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Cyber Security. * You have a passion for Cyber Security, being the basic ingredient of success. We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks
                          plus
                          You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures. * You focus on managing solutions in the areas of electronic security and critical communications.
                          You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures. * You focus on managing solutions in the areas of electronic security and critical communications.
                          plus

                          Nous avons étendu votre recherche à plus de 25 offres d’emploi similaires.

                          You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. - Cloud Networking & Security: Azure
                          You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. - Cloud Networking & Security: Azure
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more.
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more.
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, ...
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, ...
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Enforce compliance with data governance policies, ensuring data products meet security, privacy, and quality standards.
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Enforce compliance with data governance policies, ensuring data products meet security, privacy, and quality standards.
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory)
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory)
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                          plus
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Implement and manage robust data governance, security, and compliance best practices within the Fabric environment, potentially leveraging tools like Microsoft Purview.
                          We complement these partnerships with in-depth Cyber, Data & AI, Software development and multi cloud expertise. * Implement and manage robust data governance, security, and compliance best practices within the Fabric environment, potentially leveraging tools like Microsoft Purview.
                          plus
                          Playing a key role in investigating, documenting, and remediating potential security incidents that impact personal data as well as possible data breaches;
                          Playing a key role in investigating, documenting, and remediating potential security incidents that impact personal data as well as possible data breaches;
                          plus
                          NOUVEAU
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          plus
                          Security and Compliance: Integrate security best practices into the development process, including vulnerability scanning, static analysis, and ensuring compliance with industry standards (e.g., ISO, IEC). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          Security and Compliance: Integrate security best practices into the development process, including vulnerability scanning, static analysis, and ensuring compliance with industry standards (e.g., ISO, IEC). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          plus

                          Jobs populaires


                          Afficher plus