Easy Apply
2
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Security service
                          • Communication
                          • Business
                          • Problem Management
                          • Proactivity
                          • Azure Architect
                          • Architect Microsoft
                          • Adviser Sales
                          • Advocate
                          • Developer Full Stack
                          • Platform Architect
                          • Presales Architect
                          • .Net Application Developer
                          • AI Architect

                          show more

                          Locations

                          Date posted

                          New jobs
                          8


                          Commute time

                          Skills








                          Categories

                          IT
                          29






                          47 results for Consultant Security jobs in Boutersem within a 30 km radius

                          Security GRC Consultant

                          Devoteam
                          Machelen
                          As a Security GRC consultant, you are able to engage with our clients in all industry sectors to scope out their cyber requirements and to deliver on their Governance, Risk and Compliance projects based on your expert advice. You will also support our clients in the development of their security program regarding compliance and data privacy, which includes performing or documenting Framework Assessments; advising on or creating appropriate Policies; and revising, creating, or assisting in the creation of Risk Management, Incident Response, Business Recovery programs. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security.
                          As a Security GRC consultant, you are able to engage with our clients in all industry sectors to scope out their cyber requirements and to deliver on their Governance, Risk and Compliance projects based on your expert advice. You will also support our clients in the development of their security program regarding compliance and data privacy, which includes performing or documenting Framework Assessments; advising on or creating appropriate Policies; and revising, creating, or assisting in the creation of Risk Management, Incident Response, Business Recovery programs. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security.
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          more
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - As the Cyber Security Architect, you will be a technical leader that will be the main interface between cyber security and network engineering teams at our customers. You will develop and maintain the standards for cyber security across the infrastructure of our customer, whether it is on-premise or in the cloud.
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - As the Cyber Security Architect, you will be a technical leader that will be the main interface between cyber security and network engineering teams at our customers. You will develop and maintain the standards for cyber security across the infrastructure of our customer, whether it is on-premise or in the cloud.
                          more
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                          more

                          No match yet? There are 42 more jobs that could match your search

                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. * Be a true Consultant: mentor teams, facilitate "Copilot Readiness" and "Prompt Engineering" workshops, and bring high energy to evangelize a modern, Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects ...
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. * Be a true Consultant: mentor teams, facilitate "Copilot Readiness" and "Prompt Engineering" workshops, and bring high energy to evangelize a modern, Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects ...
                          more
                          Governance & Security: Implement robust data governance, security, and compliance best practices within the Fabric environment, potentially using Microsoft Purview. * Consulting & Leadership: Proven experience in a client-facing role (e.g., Consultant, Architect, or Technical Lead, Evangelist), including supporting the sales cycle and translating requirements into Statements of Work (SOWs).
                          Governance & Security: Implement robust data governance, security, and compliance best practices within the Fabric environment, potentially using Microsoft Purview. * Consulting & Leadership: Proven experience in a client-facing role (e.g., Consultant, Architect, or Technical Lead, Evangelist), including supporting the sales cycle and translating requirements into Statements of Work (SOWs).
                          more
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          more

                          Sales Executive Microsoft (M365 & Azure)

                          Talents4You N.V.
                          Zaventem
                          Partially remote
                          Easy Apply
                          Solution Selling: Understand customer needs and effectively position Microsoft Cloud (Azure, M365 and Power platform), Data/AI and Security * Proven Track Record: 5 years of proven experience in selling IT solutions, with a strong focus on Microsoft Cloud, Data & AI and Security
                          Solution Selling: Understand customer needs and effectively position Microsoft Cloud (Azure, M365 and Power platform), Data/AI and Security * Proven Track Record: 5 years of proven experience in selling IT solutions, with a strong focus on Microsoft Cloud, Data & AI and Security
                          more
                          Responsible for the full payroll process from A to Z, including: collection and validation of payroll input, monthly payroll calculations and checks, follow-up social security, taxes, and benefits, coordination with the payroll provider, handling payroll-related questions from employees
                          Responsible for the full payroll process from A to Z, including: collection and validation of payroll input, monthly payroll calculations and checks, follow-up social security, taxes, and benefits, coordination with the payroll provider, handling payroll-related questions from employees
                          more
                          Playing a key role in investigating, documenting, and remediating potential security incidents that impact personal data as well as possible data breaches;
                          Playing a key role in investigating, documenting, and remediating potential security incidents that impact personal data as well as possible data breaches;
                          more
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          more
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          more
                          You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                          You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                          more
                          NEW
                          Bachelor- of masterdiploma in informatica (bij voorkeur in een security afstudeerrichting) * Passie voor IT en specifiek in Cyber Security (niet louter "ik vind het interessant/leuk") ;-) * Bepaalde relevante certificaten op het gebied van Cyber Security
                          Bachelor- of masterdiploma in informatica (bij voorkeur in een security afstudeerrichting) * Passie voor IT en specifiek in Cyber Security (niet louter "ik vind het interessant/leuk") ;-) * Bepaalde relevante certificaten op het gebied van Cyber Security
                          more

                          DevRel Evangelist / Advocate

                          GuardSquare nv
                          Boston, Massachusetts, United States, Leuven, Belgium
                          Partially remote
                          Guardsquare offers the most complete approach to mobile application security on the market, delivering the highest level of protection in the easiest possible way. Guardsquare's software integrates seamlessly across the development lifecycle, from app security testing to code hardening to real-time visibility into the threat landscape. Guardsquare products provide enhanced mobile application security from early in the development process through publication. More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications and SDKs against reverse engineering and tampering in the ever-evolving threat landscape. Guardsquare is looking for a developer or technically savvy person who is passionate about mobile app security and engaging with peers both digitally and in person ...
                          Guardsquare offers the most complete approach to mobile application security on the market, delivering the highest level of protection in the easiest possible way. Guardsquare's software integrates seamlessly across the development lifecycle, from app security testing to code hardening to real-time visibility into the threat landscape. Guardsquare products provide enhanced mobile application security from early in the development process through publication. More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications and SDKs against reverse engineering and tampering in the ever-evolving threat landscape. Guardsquare is looking for a developer or technically savvy person who is passionate about mobile app security and engaging with peers both digitally and in person ...
                          more
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          more
                          DataCamp's infrastructure team, which is part of the Platform Engineering department, is a T-shaped cross functional team that looks after CI/CD pipelines, cloud infrastructure (deployed on AWS), logging, monitoring and security. The infrastructure team aims to enhance productivity, scalability, availability and security by providing feedback cycles for teams so they follow a of continuous improvement. * Prioritize self-service solutions and automation for deployment, infrastructure provisioning, cost control, and security standards. Has 2+ years of security tooling experience (vulnerability scanning tooling)
                          DataCamp's infrastructure team, which is part of the Platform Engineering department, is a T-shaped cross functional team that looks after CI/CD pipelines, cloud infrastructure (deployed on AWS), logging, monitoring and security. The infrastructure team aims to enhance productivity, scalability, availability and security by providing feedback cycles for teams so they follow a of continuous improvement. * Prioritize self-service solutions and automation for deployment, infrastructure provisioning, cost control, and security standards. Has 2+ years of security tooling experience (vulnerability scanning tooling)
                          more

                          Popular Jobs


                          show more

                          What is the average salary for Consultant Security in Boutersem?

                          Average salary per year
                          41.100 €

                          The average salary for a Consultant Security in Boutersem is 41.100 €. Consultant Security in Boutersem salaries range from 35.300 € to 51.300 €.

                          Frequently Asked Questions

                          How many Consultant Security jobs are there in Boutersem?
                          There are 47 Consultant Security jobs within 20 miles of Boutersem available on StepStone right now.

                          What other similar jobs are there to Consultant Security jobs in Boutersem?
                          As well as Consultant Security jobs in Boutersem, you can find IT, Security service, Communication, amongst many others.

                          Which skills are beneficial for Consultant Security jobs in Boutersem?
                          The following skills are useful for Consultant Security jobs in Boutersem: Security service, Communication, Business, Problem Management, Proactivity.

                          Which industry do Consultant Security jobs in Boutersem belong to?
                          Consultant Security jobs in Boutersem are part of the Security industry.

                          How many temporary and part-time Consultant Security jobs are available in Boutersem?
                          There are 0 temporary Consultant Security jobs and 1 part-time Consultant Security jobs available in Boutersem at the moment.