Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

Communication
SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
          1 selected
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Communication
                          • Security service
                          • Business
                          • Technology
                          • Design
                          • Azure Architect
                          • Architectural Consultant
                          • Cyber Strategy Consultant
                          • Architect Microsoft
                          • Pre-sale engineer
                          • Advocate
                          • Azure Security Engineer
                          • Chief Mate
                          • Cloud Security Engineer

                          show more

                          Locations

                          Communication
                          Remove all filters

                          Date posted

                          New jobs
                          8


                          Commute time

                          Skills


                          Communication
                          69






                          Categories

                          IT
                          42






                          34 results for Consultant Security jobs in Begijnendijk within a 30 km radius

                          Security GRC Consultant

                          Devoteam
                          Machelen
                          As a Security GRC consultant, you are able to engage with our clients in all industry sectors to scope out their cyber requirements and to deliver on their Governance, Risk and Compliance projects based on your expert advice. You will also support our clients in the development of their security program regarding compliance and data privacy, which includes performing or documenting Framework Assessments; advising on or creating appropriate Policies; and revising, creating, or assisting in the creation of Risk Management, Incident Response, Business Recovery programs. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security.
                          As a Security GRC consultant, you are able to engage with our clients in all industry sectors to scope out their cyber requirements and to deliver on their Governance, Risk and Compliance projects based on your expert advice. You will also support our clients in the development of their security program regarding compliance and data privacy, which includes performing or documenting Framework Assessments; advising on or creating appropriate Policies; and revising, creating, or assisting in the creation of Risk Management, Incident Response, Business Recovery programs. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security.
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          more
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                          more

                          No match yet? There are 30 more jobs that could match your search

                          Je houdt rekening met security en draagt actief bij aan een veilige en bedrijfszekere IT-omgeving. * Je schakelt externe consultants in wanneer specifieke expertise nodig is en zorgt dat de kennis intern geborgd wordt.
                          Je houdt rekening met security en draagt actief bij aan een veilige en bedrijfszekere IT-omgeving. * Je schakelt externe consultants in wanneer specifieke expertise nodig is en zorgt dat de kennis intern geborgd wordt.
                          more
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. * Be a true Consultant: mentor teams, facilitate "Copilot Readiness" and "Prompt Engineering" workshops, and bring high energy to evangelize a modern, Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects ...
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. * Be a true Consultant: mentor teams, facilitate "Copilot Readiness" and "Prompt Engineering" workshops, and bring high energy to evangelize a modern, Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects ...
                          more
                          Governance & Security: Implement robust data governance, security, and compliance best practices within the Fabric environment, potentially using Microsoft Purview. * Consulting & Leadership: Proven experience in a client-facing role (e.g., Consultant, Architect, or Technical Lead, Evangelist), including supporting the sales cycle and translating requirements into Statements of Work (SOWs).
                          Governance & Security: Implement robust data governance, security, and compliance best practices within the Fabric environment, potentially using Microsoft Purview. * Consulting & Leadership: Proven experience in a client-facing role (e.g., Consultant, Architect, or Technical Lead, Evangelist), including supporting the sales cycle and translating requirements into Statements of Work (SOWs).
                          more
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          more
                          We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. * You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. - Cloud Networking & Security: Azure
                          We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. * You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. - Cloud Networking & Security: Azure
                          more
                          Tijdens deze uitvoering heb je een scherpe focus op scope, security, klantwaarde en rendabiliteit. Je koppelt logistieke uitrol aan naadloze IT-integratie (bijv. printmanagement, identity, security) en bewaakt tegelijk de businesscase: planning, budget en klanttevredenheid. * Je leidt de IT‑ en security‑regie: je coördineert integraties met printmanagement (bijv. uniFLOW) en workflow/printproductie, inclusief de services voor de BAU‑fase . * In nauwe afstemming met klant‑IT en onze specialisten borg je netwerk- en security‑eisen (TCP/IP, DNS, firewall/proxy, TLS en certificaten), richt je logboek/monitoring in en werk je met solide DTAP‑procedures * Ervaring met identity/SSO en security-basics (certificaten, hardening, informatie veiligheid.).
                          Tijdens deze uitvoering heb je een scherpe focus op scope, security, klantwaarde en rendabiliteit. Je koppelt logistieke uitrol aan naadloze IT-integratie (bijv. printmanagement, identity, security) en bewaakt tegelijk de businesscase: planning, budget en klanttevredenheid. * Je leidt de IT‑ en security‑regie: je coördineert integraties met printmanagement (bijv. uniFLOW) en workflow/printproductie, inclusief de services voor de BAU‑fase . * In nauwe afstemming met klant‑IT en onze specialisten borg je netwerk- en security‑eisen (TCP/IP, DNS, firewall/proxy, TLS en certificaten), richt je logboek/monitoring in en werk je met solide DTAP‑procedures * Ervaring met identity/SSO en security-basics (certificaten, hardening, informatie veiligheid.).
                          more
                          Responsible for the full payroll process from A to Z, including: collection and validation of payroll input, monthly payroll calculations and checks, follow-up social security, taxes, and benefits, coordination with the payroll provider, handling payroll-related questions from employees
                          Responsible for the full payroll process from A to Z, including: collection and validation of payroll input, monthly payroll calculations and checks, follow-up social security, taxes, and benefits, coordination with the payroll provider, handling payroll-related questions from employees
                          more
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          more
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          more
                          Sterke kennis van IT-infrastructuur, Cloud, Security en aanverwante domeinen. * Technische coaching door onze Senior Networking & Security Engineers
                          Sterke kennis van IT-infrastructuur, Cloud, Security en aanverwante domeinen. * Technische coaching door onze Senior Networking & Security Engineers
                          more
                          NEW
                          Bachelor- of masterdiploma in informatica (bij voorkeur in een security afstudeerrichting) * Passie voor IT en specifiek in Cyber Security (niet louter "ik vind het interessant/leuk") ;-) * Bepaalde relevante certificaten op het gebied van Cyber Security
                          Bachelor- of masterdiploma in informatica (bij voorkeur in een security afstudeerrichting) * Passie voor IT en specifiek in Cyber Security (niet louter "ik vind het interessant/leuk") ;-) * Bepaalde relevante certificaten op het gebied van Cyber Security
                          more
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                          more
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          more
                          You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                          You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                          more

                          DevRel Evangelist / Advocate

                          GuardSquare nv
                          Boston, Massachusetts, United States, Leuven, Belgium
                          Partially remote
                          Guardsquare offers the most complete approach to mobile application security on the market, delivering the highest level of protection in the easiest possible way. Guardsquare's software integrates seamlessly across the development lifecycle, from app security testing to code hardening to real-time visibility into the threat landscape. Guardsquare products provide enhanced mobile application security from early in the development process through publication. More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications and SDKs against reverse engineering and tampering in the ever-evolving threat landscape. Guardsquare is looking for a developer or technically savvy person who is passionate about mobile app security and engaging with peers both digitally and in person ...
                          Guardsquare offers the most complete approach to mobile application security on the market, delivering the highest level of protection in the easiest possible way. Guardsquare's software integrates seamlessly across the development lifecycle, from app security testing to code hardening to real-time visibility into the threat landscape. Guardsquare products provide enhanced mobile application security from early in the development process through publication. More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications and SDKs against reverse engineering and tampering in the ever-evolving threat landscape. Guardsquare is looking for a developer or technically savvy person who is passionate about mobile app security and engaging with peers both digitally and in person ...
                          more
                          Security and Compliance: Integrate security best practices into the development process, including vulnerability scanning, static analysis, and ensuring compliance with industry standards (e.g., ISO, IEC). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          Security and Compliance: Integrate security best practices into the development process, including vulnerability scanning, static analysis, and ensuring compliance with industry standards (e.g., ISO, IEC). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          more
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          more

                          Popular Jobs


                          show more

                          What is the average salary for Consultant Security in Begijnendijk?

                          Average salary per year
                          41.100 €

                          The average salary for a Consultant Security in Begijnendijk is 41.100 €. Consultant Security in Begijnendijk salaries range from 35.300 € to 51.300 €.

                          Frequently Asked Questions

                          How many Consultant Security jobs are there in Begijnendijk?
                          There are 34 Consultant Security jobs within 20 miles of Begijnendijk available on StepStone right now.

                          What other similar jobs are there to Consultant Security jobs in Begijnendijk?
                          As well as Consultant Security jobs in Begijnendijk, you can find IT, Communication, Security service, amongst many others.

                          Which skills are beneficial for Consultant Security jobs in Begijnendijk?
                          The following skills are useful for Consultant Security jobs in Begijnendijk: Communication, Security service, Business, Technology, Design.

                          Which industry do Consultant Security jobs in Begijnendijk belong to?
                          Consultant Security jobs in Begijnendijk are part of the Security industry.

                          How many temporary and part-time Consultant Security jobs are available in Begijnendijk?
                          There are 0 temporary Consultant Security jobs and 1 part-time Consultant Security jobs available in Begijnendijk at the moment.