Date
Options télétravail
Temps de trajet
Méthode de candidature
Langue du job
Compétences
Fonctions
Secteur
Région
Ville
Expérience
Type de contrat
Régime de travail

Critères

Design
Le triPertinence
Date
    Options télétravail
      Temps de trajet
      Méthode de candidature
        Langue du job
          Compétences
          1 sélectionné
            Fonctions
              Secteur
                Région
                  Ville
                    Expérience
                      Type de contrat
                        Régime de travail

                          Jobs populaires

                          • IT
                          • Design
                          • Service de sécurité
                          • Communication
                          • Business
                          • Technologie
                          • Architecte de sécurité
                          • Architecte Microsoft
                          • Conseiller en sécurité
                          • Ingénieur/e avant vente
                          • Architecte applicatif
                          • Architecte de logiciel
                          • Azure Architect
                          • Chargé d'études en organisation et informatique
                          • Chargé/e de mission

                          Afficher plus

                          Emplacements

                          Design
                          Supprimer tous les filtres

                          Date

                          Nouveaux jobs dernières 24h
                          3


                          Temps de trajet

                          Compétences


                          Design
                          36






                          Fonctions

                          IT
                          30






                          20 résultats pour Security Employee à Kontich dans un rayon de 30 km

                          Nous avons étendu votre recherche à plus de 20 offres d’emploi similaires.

                          Security Architect – Privileged Access Management

                          Devoteam
                          Machelen
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          plus
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          plus
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          plus
                          Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security) We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security) We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault). We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault). We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security. We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security. We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory) We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory) We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, Security/Purview, Power Platform). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity ...
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, Security/Purview, Power Platform). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity ...
                          plus
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be . We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be . We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          You will mentor a team of engineers, driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS. We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          You will mentor a team of engineers, driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS. We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          Implement and manage robust data governance, security, and compliance best practices within the Fabric environment, potentially leveraging tools like Microsoft Purview. We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          Implement and manage robust data governance, security, and compliance best practices within the Fabric environment, potentially leveraging tools like Microsoft Purview. We believe an inspiring workspace fuels creativity and fosters a positive work culture, allowing our employees to reach their full potential.
                          plus
                          To strengthen their team, they are recruiting a Microsoft Security Solution Consultant with strong expertise in Microsoft Purview and/or the Microsoft Defender security ecosystem. Acting as a trusted , you help customers elevate their security maturity and adopt the Microsoft security stack effectively. • Defender for Identity: AD security posture, lateral movement detection, identity-based alerts • Defender for Cloud: multi-cloud workload protection, security recommendations, compliance setup • Ability to translate business needs into technical security solutions • A chance to grow inside a fast-developing security practice
                          To strengthen their team, they are recruiting a Microsoft Security Solution Consultant with strong expertise in Microsoft Purview and/or the Microsoft Defender security ecosystem. Acting as a trusted , you help customers elevate their security maturity and adopt the Microsoft security stack effectively. • Defender for Identity: AD security posture, lateral movement detection, identity-based alerts • Defender for Cloud: multi-cloud workload protection, security recommendations, compliance setup • Ability to translate business needs into technical security solutions • A chance to grow inside a fast-developing security practice
                          plus
                          We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. * You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. - Cloud Networking & Security: Azure
                          We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. * You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. - Cloud Networking & Security: Azure
                          plus
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          plus
                          You focus on managing solutions in the areas of electronic security and critical communications. * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures.
                          You focus on managing solutions in the areas of electronic security and critical communications. * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures.
                          plus
                          NOUVEAU
                          Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more.
                          Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more.
                          plus
                          People and technology are building the next generation of security with us! * Design end-to-end electronic security solutions (access control, CCTV, intrusion, PSIM, analytics, etc.) The Business Consultant operates in a complex, project-driven environment where technology, security and customer expectations evolve rapidly. * Strong knowledge of electronic security technologies (access control, CCTV, intrusion, analytics, PSIM, AI, etc.)
                          People and technology are building the next generation of security with us! * Design end-to-end electronic security solutions (access control, CCTV, intrusion, PSIM, analytics, etc.) The Business Consultant operates in a complex, project-driven environment where technology, security and customer expectations evolve rapidly. * Strong knowledge of electronic security technologies (access control, CCTV, intrusion, analytics, PSIM, AI, etc.)
                          plus

                          Nous avons étendu votre recherche avec 16 offres d'emploi dans d'autres régions

                          STIB / MIVB * Bruxelles * Vast contract, onbepaalde tijd * Voltijds - La STIB, c'est plus de 10.000 collaborateurs et collaboratrices engagés parmi plus de 300 métiers différents ! Saviez-vous que nous faisons partie des rares entreprises de transport publique au monde s'occupant tant de la conceptualisation et la construction que de la planification et l'exploitation de son réseau ? C'est ce qui explique que nous ayons autant de métiers différents et que les perspectives de carrières soient si nombreuses. La digitalisation de nos activités, la modernisation du métro, l'élargissement du réseau tram et la construction de nouveaux dépôts ne sont que quelques exemples des projets passionnants pour lesquels la STIB recherche des collaborateurs enthousiastes. Vos responsabilités - Votre environnement - Comment faites-vous bouger Bruxelles ?
                          STIB / MIVB * Bruxelles * Vast contract, onbepaalde tijd * Voltijds - La STIB, c'est plus de 10.000 collaborateurs et collaboratrices engagés parmi plus de 300 métiers différents ! Saviez-vous que nous faisons partie des rares entreprises de transport publique au monde s'occupant tant de la conceptualisation et la construction que de la planification et l'exploitation de son réseau ? C'est ce qui explique que nous ayons autant de métiers différents et que les perspectives de carrières soient si nombreuses. La digitalisation de nos activités, la modernisation du métro, l'élargissement du réseau tram et la construction de nouveaux dépôts ne sont que quelques exemples des projets passionnants pour lesquels la STIB recherche des collaborateurs enthousiastes. Vos responsabilités - Votre environnement - Comment faites-vous bouger Bruxelles ?
                          plus
                          Vous possédez au moins 3 ans d'expérience dans les environnements Azure et une solide expertise en Azure Networking, Cost Management, Governance and Security, Automation via Bicep ou PowerShell.
                          Vous possédez au moins 3 ans d'expérience dans les environnements Azure et une solide expertise en Azure Networking, Cost Management, Governance and Security, Automation via Bicep ou PowerShell.
                          plus
                          Promouvoir la transversalité (fonctions, méthodologies, bonnes pratiques, technologies, outils, etc.) au sein du département IT Solutions, ainsi que la collaboration avec les autres départements IT (Infrastructure & Operations, IT Sécurity, Office of the CIO) et les parties prenantes métier.
                          Promouvoir la transversalité (fonctions, méthodologies, bonnes pratiques, technologies, outils, etc.) au sein du département IT Solutions, ainsi que la collaboration avec les autres départements IT (Infrastructure & Operations, IT Sécurity, Office of the CIO) et les parties prenantes métier.
                          plus

                          Jobs populaires


                          Afficher plus

                          Quel est le salaire moyen pour Security Employee à Kontich?

                          Salaire moyen par an
                          39.400 €

                          Le salaire moyen pour les emplois Security Employee à Kontich est de 39.400 €. Les salaires de Security Employee à Kontich vont de 33.200 € à 48.900 €.