Back to list

IT Security Engineer

As our IT Security Engineer, you will be responsible for keeping the perimeter of skeyes safe and sound and forming the line of defence against unauthorised access, external breaches and potential security threats, and this including the skeyes data centre, regional airports and head office. 

You will also be involved in various IT domains of the skeyes IT landscape including the skeyes operational aviation systems and applications, the skeyes business applications, the end-user systems and the skeyes Cloud platforms.

What does a skeyes IT Security Engineer do?

  • you analyse and correlate security event information from logs, endpoints, networks and Cloud environments across multiple systems, applications and users to detect and mitigate external and internal threats;
  • most of your time will go into implementing security projects and configuring and maintaining the IT security components;
  • you provide security advice to technical and management teams and ensure that security principles are implemented;
  • you work with various teams to ensure that all relevant security risks are identified, evaluated and that appropriate and balanced security solutions are implemented to manage the risks to the organisation;
  • you will keep abreast of evolutions and developments concerning IT security and/or relevant technologies and assess their usability and possibilities within the IT organisation of skeyes;
  • you assess, analyse and report on emerging IT security risks and trends, including any effects on the organisation's security posture.

Candidate profile

What makes you the perfect IT Security Engineer?

  • You hold a Bachelor's and/or Master's degree with specialisation in Computer Science or equivalent, and you can subsequently present the necessary security certifications (preferably: CISSP - ISC2 or CISM - ISACA).
  • You have at least 10 years of relevant experience in a similar role, preferably in worldwide companies, government or critical infrastructure.
  • You have in-depth knowledge of the following areas:
    • Security & Risk Management;
    • Asset Security;
    • Security Architecture & Engineering;
    • Communications & Network Security;
    • Identity & Access Management;
    • Security Assessment & Testing – Vulnerability management;
    • Security Operations;
    • Software Development Security.
  • You also have thorough knowledge of the following areas:
    • Networks: router, switch, firewall, proxy, reverse proxy, (Web) Application gateway;
    • Computer systems: authentication servers (AD, LDAP, RADIUS, TACACS,…), application servers, webservers, database servers, storage, messaging servers, client computer, Microsoft and Linux operating systems…;
    • Cloud: O365, Azure.
  • You are an expert in the field of designing, configuring, managing and maintaining:
    • Firewalls: Next Gen Firewalls (IDS/IPS), web application Firewalls (WAF), Load-balancers, DDoS security including the associated management systems;
    • Remote access: VPN systems, Proxy management, Network security zones (DMZ) and Network access control;
    • Applications: DNS services, Secure email gateways and Antivirus/antimalware.
  • You have thorough knowledge of the following techniques: SSL and SSL inspection, IDS/IPS, SIEM, certificates and encryption, malware inspection.
  • You have experience working with multiple suppliers and MSP (managed service providers) to delegate tasks related to incident resolution and change implementation.
  • You have a good command of English combined with French or Dutch in order to communicate adequately.
Apply Print

Security Screening


In light of the vacancy to which you respond we would like to draw your special attention to the fact that prior to being employed by skeyes candidates have to undergo a security screening which will be carried out by the National Security Authority. More info

Cookies policy

skeyes uses cookies on this website. Essential cookies are necessary for the website to work properly and cannot be refused. Functional cookies are useful for certain features of the site. You can refuse them but, in some cases, your use of the site may not be optimal. Other cookies are used for analytical and marketing purposes and will only be placed if you agree to their placement. See our cookies policy to find out more.