• Home
  • Jobs & Internships
  • Education
  • Career
  • Employers
  • Human Capital Activities
  • About
  • News
  • Events
  • Contact
  • Newsletter
  • Security Talent
  • Cyber Security Werkt
  • Cyber Security Summer School
  • Security Insight

My competence profile

Create your personal competence profile to match your skills and experiences with the requirements of the listed items on this page.
Create my competence profile

 

 

Already created your competence profile on a different browser or device?

Restore my competence profile via email
  • Security Talent
  • Cyber Security Werkt
  • Cyber Security Summer School
  • Security Insight
  • NL
  • EN
Security Talent
  • NL
  • EN
  • About
  • News
  • Events
  • Contact
  • Newsletter
  • Home
  • Jobs & Internships
  • Education
  • Career
  • Employers
  • Human Capital Activities
Security Talent
547
Studies & Courses
240
Jobs & Internships
107
Education Providers
209
Employers

0
Studies & Courses
0
Jobs & Internships
0
Education Providers
0
Employers
It’s that combination between the technical and social aspects of information security that make this job so attractive to me
’’
’ It’s that combination between the technical and social aspects of information security that make this job so attractive to me ’
’’
’ It’s that combination between the technical and social aspects of information security that make this job so attractive to me ’
While he has only just graduated from his bachelor in Information Security Management, Fynn already secured himself a challenging job as a security engineer at Guardian360. We had a talk with him about why he choose for a career in cybersecurity and his work.
Fynn Loeffen
Fynn Loeffen
Security Engineer
Read Interview
You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it.
’’
’ You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it. ’
’’
’ You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it. ’
Stein is a perfect example of someone who does not have a typical security study but found his way into the security domain through experience and a curiosity for the business. Read his interview to find out how he got to be the Chief Technology Architect at a succesful...
Stein Welberg
Stein Welberg
Chief Technology Architect
Read Interview
If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on.
’’
’ If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on. ’
’’
’ If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on. ’
Bas works as a Security Analyst in the Security Operations Center (SOC) at DearBytes. We were curious to find out what kind of challenges and incidents a Security Analyst has to deal with and what life is like at DearBytes.
Bas van den Bosch
Bas van den Bosch
Security Analyst
Read Interview
It’s all about finding and protecting those ‘crown jewels
’’
’ It’s all about finding and protecting those ‘crown jewels ’
’’
’ It’s all about finding and protecting those ‘crown jewels ’
As an Information Security Consultant, Mike helps organisations identify potential risks and threats to their core business and how to deal with this. Read the interview to find out what he does exactly to protect the 'crown jewels'.
Mike Onderdelinden
Mike Onderdelinden
Information Security Consultant
Read Interview
For the time being I’ll keep doing all sorts of different things I find interesting.
’’
’ For the time being I’ll keep doing all sorts of different things I find interesting. ’
’’
’ For the time being I’ll keep doing all sorts of different things I find interesting. ’
When you complete the infamous Kerckhoffs master, a well renowned name in the security scene it's obvious that you will need a good challenge when you start your career. Erwin found this challenge at TNO where he started as a researcher and security consultant. Read how he got...
Erwin Middelesch
Erwin Middelesch
Researcher and Security consultant
Read Interview

Latest Jobs & Internships

Nederlands Forensisch Instituut (NFI)
Forensisch Software Engineer
nl-NL
Permanent employment | Den Haag
Meltwater
Account Executive
Permanent employment | Amsterdam
Starion Nederland B.V.
AOCS Systems Engineer
Permanent employment | Leiden
Cegeka
Global Data AI Solution Architect
nl-NL
Permanent employment | Veenendaal
Ministry of Defence
Hoofd Operaties DCSC
nl-NL
Permanent employment | Huis ter Heide

Studies & Courses in Safety & Security

Nederlandse AI Coalitie (NL AIC)
Elements of AI
nl-NL
Nederlandse AI Coalitie (NL AIC) | Leidschendam, Online
Software Improvement Group (SIG)
EXIN Information Security Foundation based on ISO/IEC 27001
Software Improvement Group (SIG) | Multiple locations, Online
Signpost Six
Insider Risk Management for Professionals
Signpost Six | Multiple locations, Online
ISACA
Cybersecurity Fundamentals
ISACA | Multiple locations, Online
LOI
MBO Beveiliger 3
nl-NL
LOI | Leiderdorp
Career Navigator in Safety & Security

Career Navigator in Safety & Security

Find your next challenge: explore possible career paths via the Career Navigator in Safety & Security
To Navigator
Dashboard Job Openings HSD-partners

Dashboard Job Openings HSD-partners

Find new insights into jobs and internships from our partners.
To Dashboard
If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet.
’’
’ If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet. ’
’’
’ If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet. ’
In 1987 I started at the PTT, the predecessor of KPN. After two years I then switched to APT, a joint venture between AT&T and Philips telecommunication, working on corporate telecom centers. After a couple of years, in 1992, I was invited for a small three-week assignment in...
Jaap Meijer
Jaap Meijer
Cyber Security and Privay Officer
Read Interview
People, process and technology: Combining digital business and human behavior insights in the field of cyber security
’’
’ People, process and technology: Combining digital business and human behavior insights in the field of cyber security ’
’’
’ People, process and technology: Combining digital business and human behavior insights in the field of cyber security ’
During her first years as a student, Laura never thought she would be working in cyber security right now. We had a talk with her to hear how she became a cyber security advisor after obtaining a master’s degree in Business Administration. Read the interview to find out how she...
Laura Sumajow
Laura Sumajow
Advisor Cybersecurity at EY
Read Interview
Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions.
’’
’ Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions. ’
’’
’ Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions. ’
Life-long learning and climbing the education ánd professional ranks is the name of the game for Joeri. We were curious to find out which educational pathway and what attitude has gotten him to his current position. So we sat down and asked him about his perspective.
Joeri Donker
Joeri Donker
Governance, Risk & Compliance Consultant
Read Interview
What I like is that I can do the investigation and research an incident and then come back with concrete results
’’
’ What I like is that I can do the investigation and research an incident and then come back with concrete results ’
’’
’ What I like is that I can do the investigation and research an incident and then come back with concrete results ’
As an incident handler she is the knight in shining armour when a crisis emerge.This time we interviewed Mandy, to find out what her tasks are in the KPN-CERT department and how she got to where she sits now. Read the interview to find out all about her role.
Mandy Mak
Mandy Mak
Incident Handler at KPN-CERT
Read Interview
Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour.
’’
’ Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour. ’
’’
’ Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour. ’
Inge Wetzer has become a recognizable face on stage at the ONE Conference in the Hague over the years. When she’s not on stage to discuss the importance of behavioural change in the field of cybersecurity, Inge works at Secura as a Social psychologist cyber security &...
Inge Wetzer
Inge Wetzer
Social psychologist cybersecurity & compliance
Read Interview

Security Talent News

New Job Profile on Security Talent - Data Analyst
New Job Profile on Security Talent - Data Analyst
20 March 2023
Nieuwe Engelstalige deeltijd master Digital Forensics
Nieuwe Engelstalige deeltijd master Digital Forensics
16 November 2022
New Career Event: Werken bij Justitie en Veiligheid
New Career Event: Werken bij Justitie en Veiligheid
09 February 2022

HSD News

CADMUS-Project: Building Tomorrow's Cybersecurity Together in Zagreb
CADMUS-Project: Building Tomorrow's Cybersecurity Together in Zagreb
06 November 2025
ITVZH Meetup & Share Session: Strengthening Collaboration for Digitalisation SMEs
ITVZH Meetup & Share Session: Strengthening Collaboration for Digitalisation SMEs
31 October 2025
Nieuw onderzoek brengt toekomstige competentiekloof in cybersecurity in kaart
Nieuw onderzoek brengt toekomstige competentiekloof in cybersecurity in kaart
11 October 2025

Upcoming Events

22-25
Sep
Security Essen 2026
23-25
Mar
ASIS Europe 2026
05-09
Oct
Cybersecurity week 2026
05-09
Oct
Cybersecurity week 2026

Weekly job alert?

Recieve vacancies by e-mail
Job Alert

Contact

Security Delta (HSD)
Wilhelmina van Pruisenweg 104
2595 AN The Hague
The Netherlands

 

T: +31 (0)70-2045180
E: info@securitytalent.nl

Sitemap

  • Jobs & Internships
  • Education
  • Career
  • Employers
  • Human Capital Activities

Follow us

LinkedIn
YouTube
Newsletter
  • Disclaimer
  • Privacy & Cookies
  • Responsible Disclosure