%PDF-1.7 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 595.280 841.890] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Producer (dompdf 1.0.2 + CPDF) /CreationDate (D:20241121102150+00'00') /ModDate (D:20241121102150+00'00') >> endobj 6 0 obj << /Type /Page /MediaBox [0.000 0.000 595.280 841.890] /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Filter /FlateDecode /Length 1847 >> stream xXYs~_yIq27b˲T*;c`)ߧs. b>l>o!%PB)Oj!4DTvX6=r g2(J"mÈ&E#Z)a7E^I FU@_nw5hjbP+ºc]tjs/Ba{; %wG0a8{FN~ؾ톾~UqE3`*3Oq~7~{49F͙%)Jޚi7659. IG\ûƴiMVDՊnk-.$%X$)y oozq{g^q]V7C?5hf_t{<:~ ~@bE]5|@԰ 5f׳ӚvLoY% 6\Cy?z" ʒp4S w'l릭[FBZ5GC3zM^HR1K tCti6VU*fXJ $gT\ȢdBR``^Tza(UY@}J&kqH&iQnquT[ `nIc*3XhE{doHwO.K_yCi~l4EiRM1 8nzok0HUAY-G]YJa *Bb<c*(`o]+|WLx2*i#X 9`eq'-d oߕVHL a^:D&jS,/`87nVxb$gpkX ^ά G-po/o,\x Fo GcGSc'4{GXfxklk)Y /&Z'{?|i ;U+Lx/*˫`h}djӷOߊ>')<@SNE?oýlM Lf??1^¢l^n0ذ_ endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Times-Roman /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Times-Roman /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /MediaBox [0.000 0.000 595.280 841.890] /Parent 3 0 R /Contents 13 0 R >> endobj 13 0 obj << /Filter /FlateDecode /Length 3159 >> stream xuZQs6~tf&QII&u:]4q׹܃V~"rCb@||gF|R_LJ)LU[i@-Ž#*˵ R/,ye@,2Y^2+k hE`جQm&RGm̺*eO|#;ɫ?_.!rjřo?ㄪoۺiĽ;bU63DŽq`[kW)0Rۊ5 Z Wo أ1M!bz|iʌyV:H5 bň7΃6ESy/. ר2 KhM[Qx̭rC3 IZ=Xͭr$1bI!4hFw>b *Vo(2 JZv[Q^X<{i_cnʹËn+á]Yu]eޘkO(BKX2ZB*, 4͇P"=yZeVy]fM=*4"Q,$2Z=K蝏Àt2O+h U͔e#4O;N H++œ_ZgbBn[ ;FlkwM?=~윴Cd9Z|;ENO1̉p4,s-ߞ&$/ a?~+>ߟWKuwӳ˔> I^źNH>dDbL v-ZrD|L 8ԆI:OT e`҇N}bL m [ȅ)_~Hm;BމOͧiq'B &{Z2C6j4<@XL$Fi>zVoA Ga4wJX؄:s|2=b;'h=DV.Oqxë|>8hxve\4nEfQ㩟+k?|c?B}%:gZ> "YeXP87B]C3`M5n%?˩B-Z=: {`MK>MffxIZS0v/8XsYt_,mt^ؠ7 |gnw)i>~3lO߾l]ӏ[sF? 3[r<-# u[LHxrZ3#tbq:o?;V#*B2` a?->-W;6xq:R0{@_PGC-$V»nCӭ@v=~,(? `xϺolW/7``=MۼW?)*x3W{po|gz/md0ak`ϡguͻ}qn߽߉BYB;3q樨op=7"v~勛UdyuwP2 V_Jʼn_pbr/tÏd W<|d]{ؤ>z *[Pȁ⒅Z/)9S%t:iDgrqzJEb endstream endobj xref 0 14 0000000000 65535 f 0000000009 00000 n 0000000074 00000 n 0000000120 00000 n 0000000313 00000 n 0000000342 00000 n 0000000491 00000 n 0000000594 00000 n 0000002514 00000 n 0000002621 00000 n 0000002730 00000 n 0000002843 00000 n 0000002953 00000 n 0000003058 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R /ID[] >> startxref 6291 %%EOF Security Project Manager - A2G Consulting
English EN Dutch NL

Security Project Manager

Netherlands

Best

Any Bachelors Degree

Job Description

Contract Period: 12 months (subject to extension)

Salary: Not a constraint for the right candidate!

Experience: 8-12 years

Visa Sponsorship Available

Your Profile & DNA:

Project Management Skills:

  • Project management experience of +5 years in big corporates
  • The ability to manage complex projects from start to finish, including developing project plans, timelines, budgets, and resource allocation.
  • Communication Skills: Excellent written and verbal communication skills, including the ability to communicate complex technical concepts to non-technical stakeholders.
  • Ability to present to senior leaders

Leadership Abilities:

  • The ability to lead and motivate cross-functional teams, including technical experts, stakeholders, and vendors.
  • Problem-Solving Skills: The ability to identify and solve complex problems related to cyber security, including identifying emerging threats and implementing effective countermeasures.

Industry Knowledge:

  • Knowledge of industry best practices, standards, and regulations related to cyber security, such as NIST, CSA, and ISO.
  • Certifications: Relevant certifications in cyber security and project management, such as CISSP, PMP, or CISM preferred but not mandatory.

Information Security domains

  • Understanding Information security E2E landscape and different domains (access management, infrastructure security, data protection, and threat management)
  • Experience with working with MSFT E5 security functionalities
  • Experience with leading projects on Network and cloud security

What do we offer?

  • a good salary matching your knowledge and experience;
  • 25 vacation days;
  • 8% vacation pay included in the gross salary;
  • we bear the 30% ruling charges, if applicable;
  • working with a team of enthusiastic, highly skilled professionals;
  • a challenging position in a dynamic and healthy development project-oriented environment;
  • opportunities to further develop and grow yourself (Certification Charges reimbursed);
  • we file your Income Tax Return for Free;
  • we assist in Relocation if applicable.

Who we are:

A2G Consulting also known as "A2G Technologies" is one of the fastest growing staffing companies in North Brabant region, Netherlands. We cater to Asia and Europe market focusing on high tech & non-high-tech clientele; headquartered in Eindhoven, Netherlands with a branch office in India (Bangalore & Pune) & Dubai. We successfully find a candidate and ensure that they get opportunities in line with their aspirations. We offer visa sponsorship for local & international candidates for career-enhancing opportunities. We strongly believe in equal opportunities and hence have a pool of resources with diversified ethnicity.

You will be deployed and work at one of our client sites.

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

Apply For This Post

We will contact you for best placements

This website uses cookies to ensure you get the best experience on our website.

Open Application

We will contact you for best placements

Open Application

We will contact you for best placements