Sign in
Sign in
Easy Apply
7
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

Design
SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
          1 selected
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Design
                          • Communication
                          • Security service
                          • Best Practices
                          • Technology
                          • Azure Cloud Architect
                          • Application Developer
                          • Application Security Architect
                          • Architect Microsoft
                          • Chief Mate
                          • Consultant Internet
                          • Data Science Developer
                          • Engineer
                          • Identity Consultant

                          show more
                          Design
                          Remove all filters

                          Date posted

                          New jobs
                          10


                          Commute time

                          Skills


                          Design
                          46






                          Categories

                          IT
                          31






                          33 results for Computer Security Manager jobs in Edegem within a 30 km radius

                          No match yet? There are 33 more jobs that could match your search

                          Senior Electrical Engineer pur sang (Mechelen)

                          Actemium
                          Mechelen
                          Volgen van evoluties in normen en richtlijnen in verband met security
                          Volgen van evoluties in normen en richtlijnen in verband met security

                          IT Data & Automation Specialist

                          Veolia
                          Grimbergen
                          Easy Apply
                          You hold a degree (Bachelor/Master) in computer sciences, data science, engineering or a related field;
                          You hold a degree (Bachelor/Master) in computer sciences, data science, engineering or a related field;
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          more
                          NEW
                          Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security.
                          Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security.
                          more
                          NEW
                          Master's in computer science/Engineer or minimum 5-10 years hand-on experience in IT and/or Security with a preference of experience in Azure environments. We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, ...
                          Master's in computer science/Engineer or minimum 5-10 years hand-on experience in IT and/or Security with a preference of experience in Azure environments. We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, ...
                          more
                          NEW
                          Ben jij een allround IT'er met een sterke interesse in infrastructuur én security? • Ontwerpen en implementeren van infrastructuur- en security-oplossingen, zowel intern als voor klanten • Analyseren en opvolgen van netwerk- en security-incidenten
                          Ben jij een allround IT'er met een sterke interesse in infrastructuur én security? • Ontwerpen en implementeren van infrastructuur- en security-oplossingen, zowel intern als voor klanten • Analyseren en opvolgen van netwerk- en security-incidenten
                          more
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Background: Master's degree (Engineering or equivalent) in IT, Computer Science, or Business. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, ...
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Background: Master's degree (Engineering or equivalent) in IT, Computer Science, or Business. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, ...
                          more
                          NEW
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. The ability to plan integrations and additions across many systems, is what separates the Cloud Database Manager the DevOps Engineer. * The practice manager is your responsible manager * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * A bachelor's degree in Computer Science, Information Technology, or related fields is preferred. * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. The ability to plan integrations and additions across many systems, is what separates the Cloud Database Manager the DevOps Engineer. * The practice manager is your responsible manager * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * A bachelor's degree in Computer Science, Information Technology, or related fields is preferred. * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          more
                          NEW
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Degree in Computer Science, Engineering, or a related field (or equivalent practical experience). * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Degree in Computer Science, Engineering, or a related field (or equivalent practical experience). * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          more
                          NEW
                          Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory) * Bachelor's degree in Computer Science, Information Technology, or a related field (or equivalent experience).
                          Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory) * Bachelor's degree in Computer Science, Information Technology, or a related field (or equivalent experience).
                          more
                          NEW
                          Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more. * Hold a University Degree in Computer Science, (Business) Engineering, or a specialized master's in Machine Learning or AI.
                          Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more. * Hold a University Degree in Computer Science, (Business) Engineering, or a specialized master's in Machine Learning or AI.
                          more
                          NEW
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          more
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          more
                          Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                          Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                          more
                          NEW
                          Easy Apply
                          Je detecteert technische risico's vroegtijdig en bewaakt kwaliteit, robuustheid en onderhoudbaarheid in een enterprise-context met hoge eisen rond security en compliance. * Je voelt je comfortabel in een enterprise-omgeving waar schaalbaarheid, security en compliance belangrijke randvoorwaarden zijn.
                          Je detecteert technische risico's vroegtijdig en bewaakt kwaliteit, robuustheid en onderhoudbaarheid in een enterprise-context met hoge eisen rond security en compliance. * Je voelt je comfortabel in een enterprise-omgeving waar schaalbaarheid, security en compliance belangrijke randvoorwaarden zijn.
                          more
                          Ensure application security and compliance by implementing identity management (Azure AD/Entra ID) and secure coding standards from the ground up. * Proficiency in building RESTful APIs and gRPC services, with a focus on security (OAuth2, OIDC) and performance.
                          Ensure application security and compliance by implementing identity management (Azure AD/Entra ID) and secure coding standards from the ground up. * Proficiency in building RESTful APIs and gRPC services, with a focus on security (OAuth2, OIDC) and performance.
                          more
                          You focus on managing solutions in the areas of electronic security and critical communications. * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures. * On the instructions of the engineering manager, you will carry out the annual inspection of electrical tools. This Technical Manager ensures that inspections are only carried out by engineers who have a VCA certificate and a BA4 certificate, but above all who pay attention to detail on all the points to be checked in document
                          You focus on managing solutions in the areas of electronic security and critical communications. * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures. * On the instructions of the engineering manager, you will carry out the annual inspection of electrical tools. This Technical Manager ensures that inspections are only carried out by engineers who have a VCA certificate and a BA4 certificate, but above all who pay attention to detail on all the points to be checked in document
                          more

                          Popular Jobs


                          show more

                          What is the average salary for Computer Security Manager in Edegem?

                          Average salary per year
                          39.400 €

                          The average salary for a Computer Security Manager in Edegem is 39.400 €. Computer Security Manager in Edegem salaries range from 33.200 € to 48.900 €.

                          Frequently Asked Questions

                          How many Computer Security Manager jobs are there in Edegem?
                          There are 33 Computer Security Manager jobs within 20 miles of Edegem available on StepStone right now.

                          What other similar jobs are there to Computer Security Manager jobs in Edegem?
                          As well as Computer Security Manager jobs in Edegem, you can find IT, Design, Communication, amongst many others.

                          Which skills are beneficial for Computer Security Manager jobs in Edegem?
                          The following skills are useful for Computer Security Manager jobs in Edegem: Design, Communication, Security service, Best Practices, Technology.

                          Which industry do Computer Security Manager jobs in Edegem belong to?
                          Computer Security Manager jobs in Edegem are part of the IT industry.