Date posted
Work from home options
Commute time
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

IT
SortingRelevance
Date posted
    Work from home options
      Commute time
      Job language
        Skills
          Categories
          1 selected
            Sectors
              Regions
                Cities
                  Experience
                    Type of Contract
                      Type of Work

                        Popular Jobs

                        • IT
                        • Security service
                        • Communication
                        • Design
                        • Cloud
                        • Microsoft Azure
                        • Azure Architect
                        • Architect Microsoft
                        • Data Insights Engineer
                        • Engineer Infrastructure
                        • Network System Engineer
                        • Platform Architect
                        • Presales Architect
                        • Senior Cloud Architect
                        • Senior Programmer Architect

                        show more
                        IT
                        Remove all filters

                        Date posted

                        New jobs
                        2


                        Commute time

                        Skills








                        Categories

                        IT
                        35










                        32 results for Coordinator Security jobs in Boechout within a 30 km radius

                        No match yet? There are 32 more jobs that could match your search

                        Information Security Analyst

                        VANBREDA RISK & BENEFITS
                        Antwerpen
                        Partially remote
                        In een wereld waarin data een zeer waardevolle asset is, speel je als Information Security Analyst een sleutelrol in het bewaken van onze information security processen. Als Information Security Analyst bij Vanbreda Risk & Benefits waak je mee over onze digitale veiligheid. Je zorgt ervoor dat security-incidenten correct worden opgevolgd, compliance mbt security gewaarborgd blijft en de veiligheidsnormen van onze infrastructuur gevolgd worden. * Incidentbeheer: Je volgt security-incidenten nauwgezet op: van registratie tot opvolging van de genomen maatregelen. * Compliance & rapportering: Je beantwoordt vragen van verzekeraars en andere externe partijen om aan te tonen dat we voldoen aan de hoogste normen op het vlak van security en compliance. Daarnaast lever je input voor het interne security dashboard, zodat onze CISO steeds een actueel overzicht heeft.
                        In een wereld waarin data een zeer waardevolle asset is, speel je als Information Security Analyst een sleutelrol in het bewaken van onze information security processen. Als Information Security Analyst bij Vanbreda Risk & Benefits waak je mee over onze digitale veiligheid. Je zorgt ervoor dat security-incidenten correct worden opgevolgd, compliance mbt security gewaarborgd blijft en de veiligheidsnormen van onze infrastructuur gevolgd worden. * Incidentbeheer: Je volgt security-incidenten nauwgezet op: van registratie tot opvolging van de genomen maatregelen. * Compliance & rapportering: Je beantwoordt vragen van verzekeraars en andere externe partijen om aan te tonen dat we voldoen aan de hoogste normen op het vlak van security en compliance. Daarnaast lever je input voor het interne security dashboard, zodat onze CISO steeds een actueel overzicht heeft.
                        more
                        We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. * You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. - Cloud Networking & Security: Azure
                        We are looking for a Network Security Engineer (M/F/X)) to join our team in Vilvoorde. As a Network Security Engineer (M/F/X) you'll be the go-to expert managing our network and security infrastructure – across our campus, datacenter, and Microsoft Azure environment. * Take charge of our network & security landscape, both on-prem and in the cloud (Azure). * Detect, assess, and fix security risks – you're our digital guardian. * You're ready to become our in-house expert on Microsoft Security tools — managing, fine-tuning, and pushing them to keep cyber threats out. - Cloud Networking & Security: Azure
                        more
                        Je ontwerpt de multi-tenant structuur, migreert de database, zet de pipelines op (alles volgens goede security standaarden) — en daarna bouw je gewoon mee aan features.
                        Je ontwerpt de multi-tenant structuur, migreert de database, zet de pipelines op (alles volgens goede security standaarden) — en daarna bouw je gewoon mee aan features.
                        more
                        Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                        Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might be right for you. information security professionals. As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. The person we are looking for combines the qualities of a good communicator and passion for Cyber Security.
                        more
                        As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                        As a Cyber Security Risk manager, you will ensure a sound security maturity level. If you are fascinated by the risk universe, especially in security, IT, cybercrime, cloud, DevOps … then you are the new colleague - The person we are looking for combines the qualities of a good communicator and an expert in the domains of Information Security, Cybercrime, and IT. * Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEMSOAR, PKI, , IAM and PAM, …). * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security. * Data Privacy and Information Security Certifications are valued including: CISSP, CEH, C/CISO, CISA, , CRISC, , CIPP/US, CIPM, CIPT or TOGAF
                        more
                        Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                        Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security, then this opportunity might - The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. * Solid MS Windows and Linux technical knowledge and operational experience: AD, IIS and Windows Security. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, ...
                        more
                        Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                        Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in cyber security then this opportunity might - We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, ...
                        more
                        We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                        We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure. As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Designing security services in cloud-based programs based on pre-defined architecture frameworks * Maintain and improve the security posture of the Azure platform * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design network security including in a hybrid context with traditional network centric controls
                        more
                        You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                        You will mentor a team of , driving the evolution of our cloud platforms and ensuring its security, , and . * Operations & Monitoring: Oversee the day-to-day operations of the cloud infrastructure at the customer, ensuring its stability, performance, and security. * Security & Compliance: Implement and maintain security best practices within the AWS environment. Ensure compliance with relevant industry regulations and security frameworks (e.g., ISO 27001, SOC 2, HIPAA). * Collaboration & Communication: Collaborate effectively with other engineering teams (e.g., development, security, data) to deliver seamless and integrated solutions. * Strong knowledge of networking concepts and security best practices in AWS.
                        more
                        NEW
                        They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                        They also collaborate with IT and security teams to ensure quality releases. Some DevOps teams include DevSecOps, which applies DevOps principles to proactive security measures. * Networking and Security Basics: Understanding of networking concepts (TCP/IP, HTTP/S, SSL/TLSand basic security . * Certifications in cloud platforms, Linux administration, virtualization, IaC, container orchestration security can be .
                        more
                        Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, Security/Purview, Power Platform). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity ...
                        Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Take the driver's seat for the Copilot deployment execution, including defining prerequisites, managing the security/compliance remediation work packages, and guiding user enablement plans. * Coordinate IT Operations, Information Security, and Business teams to ensure a secure foundation for (permissions, data classification, etc.) and maximize user adoption. Experience: X+ years of experience in Solution Architecture, Consulting, and managing large-scale M365 implementation projects (e.g., SharePoint, Teams, OneDrive, Security/Purview, Power Platform). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity ...
                        more
                        Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                        Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                        more
                        Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                        Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                        more
                        Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                        Integreren van security, ISMS en secure development lifecycle in elk ontwerp. * Hands-on meewerken aan onze digitale infrastructuur (network, compute, storage, security) en verbeterprojecten.
                        more
                        Onze multitenant-architectuur ondersteunt honderden praktijken met strikte data-isolatie en geavanceerde security features. Ervaring: Minimaal 5 jaar ervaring als Enterprise mindset: Je denkt in schaalbaarheid, security, performance en maintainability - Multitenant architectuur: Begrip van tenant-isolatie, data segmentatie en security in multitenant systemen
                        Onze multitenant-architectuur ondersteunt honderden praktijken met strikte data-isolatie en geavanceerde security features. Ervaring: Minimaal 5 jaar ervaring als Enterprise mindset: Je denkt in schaalbaarheid, security, performance en maintainability - Multitenant architectuur: Begrip van tenant-isolatie, data segmentatie en security in multitenant systemen
                        more
                        Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                        Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                        more
                        You focus on managing solutions in the areas of electronic security and critical communications. * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures.
                        You focus on managing solutions in the areas of electronic security and critical communications. * You will pay close attention to the (cyber) security aspects of the solutions, while complying with Securitas' policies and procedures.
                        more
                        Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                        Experience in the design and implementation of ServiceNow security architecture * Involvement in environment and platform health support (performance, manageability, usability, scalability, upgradability, and security)
                        more
                        Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory)
                        Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory)
                        more
                        Je fungeert als centraal aanspreekpunt voor alles wat te maken heeft met interne infrastructuur en IT-security. 2. IT-security & compliance * Inzicht in IT-security binnen een beveiligingscontext is een sterke troef.
                        Je fungeert als centraal aanspreekpunt voor alles wat te maken heeft met interne infrastructuur en IT-security. 2. IT-security & compliance * Inzicht in IT-security binnen een beveiligingscontext is een sterke troef.
                        more
                        Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                        Develop and maintain technical documentation for developed applications, including considerations for security and data handling. * Adhere to and promote best practices in application development, security (leveraging Microsoft Entra ID features), and M365/Power Platform governance, including data classification and protection informed by Microsoft Purview. * Nice to have: Proficiency in using Dataverse as a data backend; experience with data modeling and security.
                        more
                        Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments.
                        Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments.
                        more

                        Popular Jobs


                        show more

                        What is the average salary for Coordinator Security in Boechout?

                        Average salary per year
                        42.100 €

                        The average salary for a Coordinator Security in Boechout is 42.100 €. Coordinator Security in Boechout salaries range from 34.800 € to 51.000 €.

                        Frequently Asked Questions

                        How many Coordinator Security jobs are there in Boechout?
                        There are 32 Coordinator Security jobs within 20 miles of Boechout available on StepStone right now.

                        What other similar jobs are there to Coordinator Security jobs in Boechout?
                        As well as Coordinator Security jobs in Boechout, you can find IT, Security service, Communication, amongst many others.

                        Which skills are beneficial for Coordinator Security jobs in Boechout?
                        The following skills are useful for Coordinator Security jobs in Boechout: Security service, Communication, Design, Cloud, Microsoft Azure.

                        Which industry do Coordinator Security jobs in Boechout belong to?
                        Coordinator Security jobs in Boechout are part of the Security industry.