Easy Apply
6
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

IT
SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
            Categories
            1 selected
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Security service
                          • Communication
                          • Microsoft Azure
                          • Design
                          • Python
                          • Azure Architect
                          • Application Security Architect
                          • Architect Microsoft
                          • Chief Mate
                          • Data Insights Engineer
                          • Developer Full Stack
                          • Developer Senior
                          • Engineer - Security
                          • Executive Information Technology Specialist

                          show more

                          Locations

                          IT
                          Remove all filters

                          Date posted

                          New jobs
                          18


                          Commute time

                          Skills








                          Categories

                          IT
                          45











                          45 results for Consultant Security jobs in Heist Op Den Berg within a 30 km radius

                          Security Architect – Privileged Access Management

                          Devoteam
                          Machelen
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                          more
                          NEW
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                          more
                          NEW
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                          more
                          NEW

                          No match yet? There are 42 more jobs that could match your search

                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. * Be a true Consultant: mentor teams, facilitate "Copilot Readiness" and "Prompt Engineering" workshops, and bring high energy to evangelize a modern, Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects ...
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. * Be a true Consultant: mentor teams, facilitate "Copilot Readiness" and "Prompt Engineering" workshops, and bring high energy to evangelize a modern, Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects ...
                          more
                          NEW
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          more
                          NEW
                          We zoeken voor het departement Informatie en Communicatietechnologie de ICT-security architect voor het team ICT-Architectuur. Jouw job als ICT-security architect is van strategisch en tactisch belang, verrassend én divers dankzij een uniek opgebouwd IT-netwerk. Bij het departement ICT ontwikkelen en implementeren we het provinciaal informatieveiligheidsbeleid en zetten in op cyber security om de provinciale collega's en bezoekers veilig gebruik te kunnen laten maken van de provinciale ICT-infrastructuur. Als ICT-security architect geef je, samen met de () en het architectenteam, vorm aan een veilig ICT-landschap voor onze organisatie.
                          We zoeken voor het departement Informatie en Communicatietechnologie de ICT-security architect voor het team ICT-Architectuur. Jouw job als ICT-security architect is van strategisch en tactisch belang, verrassend én divers dankzij een uniek opgebouwd IT-netwerk. Bij het departement ICT ontwikkelen en implementeren we het provinciaal informatieveiligheidsbeleid en zetten in op cyber security om de provinciale collega's en bezoekers veilig gebruik te kunnen laten maken van de provinciale ICT-infrastructuur. Als ICT-security architect geef je, samen met de () en het architectenteam, vorm aan een veilig ICT-landschap voor onze organisatie.
                          more
                          Join our Innovation Team, where we explore cutting-edge concepts at the intersection of Machine Learning and Security. Our mission is to develop forward-looking solutions—such as model protection, privacy-preserving ML, security for agentic AI, and anomaly detection—that will later be integrated into our Edge products. Develop security tools and frameworks for Bring Your Own Model (BYOM) workflows and perform threat modeling for ML pipelines. Ensure proactive detection of vulnerabilities and compliance with emerging ML security standards. * Build security scanning tools for ML artifacts and deployment workflows. * Collaborate with internal teams to integrate security checks into development pipelines. * Understanding of compliance frameworks (NIST AI RMF, ISO/IEC AI security standards). Please note: The successful candidate may/will be responsible for security related tasks.
                          Join our Innovation Team, where we explore cutting-edge concepts at the intersection of Machine Learning and Security. Our mission is to develop forward-looking solutions—such as model protection, privacy-preserving ML, security for agentic AI, and anomaly detection—that will later be integrated into our Edge products. Develop security tools and frameworks for Bring Your Own Model (BYOM) workflows and perform threat modeling for ML pipelines. Ensure proactive detection of vulnerabilities and compliance with emerging ML security standards. * Build security scanning tools for ML artifacts and deployment workflows. * Collaborate with internal teams to integrate security checks into development pipelines. * Understanding of compliance frameworks (NIST AI RMF, ISO/IEC AI security standards). Please note: The successful candidate may/will be responsible for security related tasks.
                          more
                          The Future Starts Here – Shape Security Innovation at NXP! Are you ready to influence the security architecture of technologies that power the world? Join NXP's Competence Center for Crypto & Security and help define secure solutions that span our entire product portfolio. We are looking for a System Security Architecture Expert who thrives on solving complex security challenges, thinks end‑to‑end, and enjoys shaping architectures that bring real value to global customers. * Drive end‑to‑end security analysis for NXP solutions, with a strong focus on product‑spanning features, interactions, and interfaces * Evaluate the cost‑benefit trade‑offs of security mechanisms and articulate architectural choices with clarity, confidence, and customer perspective * Stay ahead of disruptive industry trends, including AI/ML, and explore the risks and opportunities they bring to the semiconductor ...
                          The Future Starts Here – Shape Security Innovation at NXP! Are you ready to influence the security architecture of technologies that power the world? Join NXP's Competence Center for Crypto & Security and help define secure solutions that span our entire product portfolio. We are looking for a System Security Architecture Expert who thrives on solving complex security challenges, thinks end‑to‑end, and enjoys shaping architectures that bring real value to global customers. * Drive end‑to‑end security analysis for NXP solutions, with a strong focus on product‑spanning features, interactions, and interfaces * Evaluate the cost‑benefit trade‑offs of security mechanisms and articulate architectural choices with clarity, confidence, and customer perspective * Stay ahead of disruptive industry trends, including AI/ML, and explore the risks and opportunities they bring to the semiconductor ...
                          more
                          Join our Innovation Team, where we explore cutting-edge concepts at the intersection of Machine Learning and Security. Our mission is to develop forward-looking solutions—such as model protection, privacy-preserving ML, security for agentic AI, and anomaly detection—that will later be integrated into our Edge products. Develop security tools and frameworks for Bring Your Own Model (BYOM) workflows and perform threat modeling for ML pipelines. Ensure proactive detection of vulnerabilities and compliance with emerging ML security standards. * Build security scanning tools for ML artifacts and deployment workflows. * Collaborate with internal teams to integrate security checks into development pipelines. * Understanding of compliance frameworks (NIST AI RMF, ISO/IEC AI security standards).
                          Join our Innovation Team, where we explore cutting-edge concepts at the intersection of Machine Learning and Security. Our mission is to develop forward-looking solutions—such as model protection, privacy-preserving ML, security for agentic AI, and anomaly detection—that will later be integrated into our Edge products. Develop security tools and frameworks for Bring Your Own Model (BYOM) workflows and perform threat modeling for ML pipelines. Ensure proactive detection of vulnerabilities and compliance with emerging ML security standards. * Build security scanning tools for ML artifacts and deployment workflows. * Collaborate with internal teams to integrate security checks into development pipelines. * Understanding of compliance frameworks (NIST AI RMF, ISO/IEC AI security standards).
                          more

                          Infrastructure Engineer

                          HeadCount
                          Leuven
                          Easy Apply
                          Help safeguard the availability, performance and security of our systems. * Reliability and security are key: our infrastructure must be available 24/7.
                          Help safeguard the availability, performance and security of our systems. * Reliability and security are key: our infrastructure must be available 24/7.
                          more
                          NEW
                          Easy Apply
                          You safeguard security and business continuity. o Monitoring logs and data sources (newsletters, EWS systems, security feeds, etc.). o Performing security updates on laptops and servers. o Improving security protocols where needed * In everything you do, security comes first.
                          You safeguard security and business continuity. o Monitoring logs and data sources (newsletters, EWS systems, security feeds, etc.). o Performing security updates on laptops and servers. o Improving security protocols where needed * In everything you do, security comes first.
                          more
                          Je bouwt aan een toekomstgerichte infrastructuur rond Cloud, Modern Workplace, Security en Operations, en stuurt daarbij een team van infrastructuurspecialisten aan. * Uitwerken van een cloud‑ en automatisatiestrategie (Azure, governance, security) o Security & Zero Trust‑principes * Grondige kennis van Azure, Microsoft 365, identity & security‑frameworks
                          Je bouwt aan een toekomstgerichte infrastructuur rond Cloud, Modern Workplace, Security en Operations, en stuurt daarbij een team van infrastructuurspecialisten aan. * Uitwerken van een cloud‑ en automatisatiestrategie (Azure, governance, security) o Security & Zero Trust‑principes * Grondige kennis van Azure, Microsoft 365, identity & security‑frameworks
                          more
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                          more
                          NEW
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                          more
                          NEW
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                          more
                          NEW
                          Bachelor- of masterdiploma in informatica (bij voorkeur in een security afstudeerrichting) * Passie voor IT en specifiek in Cyber Security (niet louter "ik vind het interessant/leuk") ;-) * Bepaalde relevante certificaten op het gebied van Cyber Security
                          Bachelor- of masterdiploma in informatica (bij voorkeur in een security afstudeerrichting) * Passie voor IT en specifiek in Cyber Security (niet louter "ik vind het interessant/leuk") ;-) * Bepaalde relevante certificaten op het gebied van Cyber Security
                          more
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          more
                          NEW
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                          more
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          more
                          NEW
                          Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                          Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                          more
                          NEW

                          Popular Jobs


                          show more

                          What is the average salary for Consultant Security in Heist Op Den Berg?

                          Average salary per year
                          41.100 €

                          The average salary for a Consultant Security in Heist Op Den Berg is 41.100 €. Consultant Security in Heist Op Den Berg salaries range from 35.300 € to 51.300 €.

                          Frequently Asked Questions

                          How many Consultant Security jobs are there in Heist Op Den Berg?
                          There are 45 Consultant Security jobs within 20 miles of Heist Op Den Berg available on StepStone right now.

                          What other similar jobs are there to Consultant Security jobs in Heist Op Den Berg?
                          As well as Consultant Security jobs in Heist Op Den Berg, you can find IT, Security service, Communication, amongst many others.

                          Which skills are beneficial for Consultant Security jobs in Heist Op Den Berg?
                          The following skills are useful for Consultant Security jobs in Heist Op Den Berg: Security service, Communication, Microsoft Azure, Design, Python.

                          Which industry do Consultant Security jobs in Heist Op Den Berg belong to?
                          Consultant Security jobs in Heist Op Den Berg are part of the Security industry.