Easy Apply
1
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

Technology
SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
          1 selected
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Technology
                          • Security service
                          • Communication
                          • Design
                          • Development
                          • Azure Cloud Architect
                          • Engineer - Security
                          • Application Security Architect
                          • Devop Engineer
                          • Manager Projects
                          • Principal Technical Officer
                          • Scrum Manager
                          • AWS Cloud Engineer
                          • AWS Infrastructure Engineer

                          show more
                          Technology
                          Remove all filters

                          Date posted

                          New jobs
                          8


                          Commute time

                          Skills


                          Technology
                          44






                          Categories

                          IT
                          26






                          43 results for Coordinator Security jobs in Bonheiden within a 30 km radius

                          No match yet? There are 42 more jobs that could match your search

                          C#.NET Tech Lead (Azure Cloud-Native)

                          Devoteam
                          Machelen
                          Ensure application security and compliance by implementing identity management (Azure AD/Entra ID) and secure coding standards from the ground up. * Proficiency in building RESTful APIs and gRPC services, with a focus on security (OAuth2, OIDC) and performance.
                          Ensure application security and compliance by implementing identity management (Azure AD/Entra ID) and secure coding standards from the ground up. * Proficiency in building RESTful APIs and gRPC services, with a focus on security (OAuth2, OIDC) and performance.
                          more
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          Ensure solutions adhere to security best practices, compliance requirements, and industry standards. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault).
                          more
                          Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) * Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods * Master's degree in computer science/Engineer/Cyber Security or relevant work experience in IT Security * You have a passion for Cyber Security, being the basic ingredient of success.
                          more
                          This means we offer cyber security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. * Design SOAR solutions based on business and security requirements; * Collaborate with internal and external security teams, assist peers with any SOAR related topic; You are passionate about cyber security, automation and leading complex technical deployment proje - You have a strong interest in cyber security and believe the following to be applicable to you? * Working and learning from the best people in the European cyber security industry. We have multiple SANS Instructors working at NVISO, our staff has presented at popular hacking conferences (BlackHat, BruCON, OWASP, etc) and all of our technical staff can acquire deep technical security certifications (GSE, GXPN, GREM, GCFA, OSCP, etc)
                          This means we offer cyber security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. * Design SOAR solutions based on business and security requirements; * Collaborate with internal and external security teams, assist peers with any SOAR related topic; You are passionate about cyber security, automation and leading complex technical deployment proje - You have a strong interest in cyber security and believe the following to be applicable to you? * Working and learning from the best people in the European cyber security industry. We have multiple SANS Instructors working at NVISO, our staff has presented at popular hacking conferences (BlackHat, BruCON, OWASP, etc) and all of our technical staff can acquire deep technical security certifications (GSE, GXPN, GREM, GCFA, OSCP, etc)
                          more
                          People and technology are building the next generation of security with us! The role provides technical and commercial expertise throughout the sales process and ensures the design of effective security solutions aligned with customer needs. * Prepare quotations and respond to tenders for Electronic Security solutions (e.g., access control, CCTV, intrusion systems, video analytics, AI, PSIM). * Strong knowledge in one or more Electronic Security domains (access control, video systems, intrusion detection, analytics, AI, PSIM).
                          People and technology are building the next generation of security with us! The role provides technical and commercial expertise throughout the sales process and ensures the design of effective security solutions aligned with customer needs. * Prepare quotations and respond to tenders for Electronic Security solutions (e.g., access control, CCTV, intrusion systems, video analytics, AI, PSIM). * Strong knowledge in one or more Electronic Security domains (access control, video systems, intrusion detection, analytics, AI, PSIM).
                          more
                          Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory)
                          Design and Architect Azure Solutions: Develop and implement comprehensive cloud solutions across IaaS, PaaS, and SaaS services, considering scalability, performance, security, and cost-effectiveness. * Security and Compliance: Ensure all Azure solutions adhere to security best practices and relevant compliance standards (e.g., GDPR, ISO 27001, NIS2, DORA). Implement robust security controls and monitoring. * Security (Azure Security Center, Azure Sentinel, Key Vault, Azure Active Directory)
                          more
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments.
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments.
                          more
                          The Value Proposal :Demonstrate how Red Hat technologies bridge the gap between software development and operations, creating a common, automated platform that improves developer productivity, operational resilience, security by design and ultimately accelerating time-to-market and reducing operational complexity.
                          The Value Proposal :Demonstrate how Red Hat technologies bridge the gap between software development and operations, creating a common, automated platform that improves developer productivity, operational resilience, security by design and ultimately accelerating time-to-market and reducing operational complexity.
                          more
                          NEW
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          Good understanding of security concepts. * Understanding of security best practices and implementing security features such as authentication and authorization. * Understanding of security and compliance standards
                          more
                          Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more.
                          Cloud Integration: Seamlessly integrate Databricks with cloud services (Azure, AWS, or GCP) for storage, compute, and security, leveraging services like Azure Data Lake Storage, AWS S3, Google Cloud Storage, and more.
                          more
                          This means we offer cyber security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. As a Senior Cyber Strategy & Architecture Consultant, you will assist our smaller and larger customers with the overall reinforcement of their security posture. * Assisting or leading client's IT or security teams with the implementation of strategic security projects. * Refining security operations processes and technologies in the area of Managed Cybersecurity Posture (Vulnerability Management as a service), Managed Detection and Response and Identity and Access Management * Assisting in reaching or maintaining compliance to information security legal, contractual, or internal requirements * Defining a Security Strategy, supported by a corporate threat assessment in collaboration with key ...
                          This means we offer cyber security services to private and governmental organizations to help them better prepare for, prevent, detect and respond to cyber security incidents. As a Senior Cyber Strategy & Architecture Consultant, you will assist our smaller and larger customers with the overall reinforcement of their security posture. * Assisting or leading client's IT or security teams with the implementation of strategic security projects. * Refining security operations processes and technologies in the area of Managed Cybersecurity Posture (Vulnerability Management as a service), Managed Detection and Response and Identity and Access Management * Assisting in reaching or maintaining compliance to information security legal, contractual, or internal requirements * Defining a Security Strategy, supported by a corporate threat assessment in collaboration with key ...
                          more
                          People and technology are building the next generation of security with us! The role provides technical and commercial expertise throughout the sales process and ensures the design of effective security solutions aligned with customer needs. * Prepare quotations and respond to tenders for Electronic Security solutions (e.g., access control, CCTV, intrusion systems, video analytics, AI, PSIM). * Strong knowledge in one or more Electronic Security domains (access control, video systems, intrusion detection, analytics, AI, PSIM).
                          People and technology are building the next generation of security with us! The role provides technical and commercial expertise throughout the sales process and ensures the design of effective security solutions aligned with customer needs. * Prepare quotations and respond to tenders for Electronic Security solutions (e.g., access control, CCTV, intrusion systems, video analytics, AI, PSIM). * Strong knowledge in one or more Electronic Security domains (access control, video systems, intrusion detection, analytics, AI, PSIM).
                          more
                          People and technology are building the next generation of security with us! In this role, you will develop long-term client relationships, identify new business opportunities, and position our advanced Security & ICT solutions in your market segment. * Strong understanding of Security and/or ICT technologies. * Axis, Mobotix, Genetec, Nedap (security)
                          People and technology are building the next generation of security with us! In this role, you will develop long-term client relationships, identify new business opportunities, and position our advanced Security & ICT solutions in your market segment. * Strong understanding of Security and/or ICT technologies. * Axis, Mobotix, Genetec, Nedap (security)
                          more

                          1 exact match is outside your preferred location

                          As an Endpoint Management Cloud Solution Architect, you will design, implement, and optimize modern endpoint management solutions leveraging Microsoft Endpoint Manager (SCCM and Intune), Windows Client technologies, and endpoint security capabilities. Accelerate Endpoint and Cloud Journeys: Engage in communities, contribute to IP creation, and leverage reusable assets to help customers adopt modern management and security solutions. Endpoint Security Familiarity with Microsoft Defender for Endpoint and security baselines. Ability to implement compliance and security policies across managed devices.
                          As an Endpoint Management Cloud Solution Architect, you will design, implement, and optimize modern endpoint management solutions leveraging Microsoft Endpoint Manager (SCCM and Intune), Windows Client technologies, and endpoint security capabilities. Accelerate Endpoint and Cloud Journeys: Engage in communities, contribute to IP creation, and leverage reusable assets to help customers adopt modern management and security solutions. Endpoint Security Familiarity with Microsoft Defender for Endpoint and security baselines. Ability to implement compliance and security policies across managed devices.
                          more
                          NEW

                          Popular Jobs


                          show more

                          What is the average salary for Coordinator Security in Bonheiden?

                          Average salary per year
                          42.100 €

                          The average salary for a Coordinator Security in Bonheiden is 42.100 €. Coordinator Security in Bonheiden salaries range from 34.800 € to 51.000 €.

                          Frequently Asked Questions

                          How many Coordinator Security jobs are there in Bonheiden?
                          There are 43 Coordinator Security jobs within 20 miles of Bonheiden available on StepStone right now.

                          What other similar jobs are there to Coordinator Security jobs in Bonheiden?
                          As well as Coordinator Security jobs in Bonheiden, you can find IT, Technology, Security service, amongst many others.

                          Which skills are beneficial for Coordinator Security jobs in Bonheiden?
                          The following skills are useful for Coordinator Security jobs in Bonheiden: Technology, Security service, Communication, Design, Development.

                          Which industry do Coordinator Security jobs in Bonheiden belong to?
                          Coordinator Security jobs in Bonheiden are part of the Security industry.