×
Register Here to Apply for Jobs or Post Jobs. X

Cryptography & Security Specialist

Job in 5600, Eindhoven, North Brabant, Netherlands
Listing for: All About Expats
Full Time position
Listed on 2026-02-23
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 EUR Yearly EUR 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Eindhoven, Netherlands | Posted on 18/07/2025

Our client, a leader in pioneering technology, is dedicated to solving some of humanity’s most complex challenges. In partnership with key industry players, they offer cutting-edge patterning solutions that are integral to the progression of microchip technology. If you're passionate about incorporating security into processes and Information Technology, this might be the perfect opportunity for you.

Job Mission

As a Cryptography and Security Specialist, you will join the Application Security team within the Technology Security Competence Center (TSCC), a segment of the Risk & Business Assurance (R&BA) department. Your primary responsibility will be to analyze security systems for potential vulnerabilities that could be exploited. This role involves identifying weaknesses and advising on the application and strengthening of cryptography. You will also be instrumental in identifying and testing new technologies that could be integrated into the organization's framework.

Your duties will include conducting comprehensive security assessments, primarily focusing on new and existing applications and IT services. Additionally, you will provide assistance and advice on security-related queries in projects, and contribute to driving security enhancements. This role requires regular interaction with stakeholders at various levels within IT and across different sectors of the organization.

This position plays a crucial role in safeguarding the organization’s information, Intellectual Property (IP), and assets, as well as those of their customers and suppliers, within the scope of the proposed solutions. This entails ensuring alignment with the organization's Information Security strategies and compliance with security policies, standards, and guidelines. It may also involve proposing additions and improvements to these standards to enhance overall security.

Responsibilities
  • Giving advice on which cryptographic tools/products to use and how to embed these in the environment.
  • Giving advice on which form of encryption best fits the environment, taking into account different factors, i.e., the classification of the data.
  • Keeping your knowledge up-to-date, especially in the cryptographic domain.
  • Setting up and monitoring governance and (co-) setting up processes and monitoring of these processes.
  • Performing project intake assessments in cooperation with the Project Security Officer.
  • Assessing applications and systems to be implemented or actual implementations based on assessments of high- and low-level designs, interviews and/or testing.
  • Assessing existing or new IT services (on premise or cloud) on technical vulnerabilities and weaknesses based on ASML process and tooling.
  • Translating assessment results into an Information Security Specification (security plan for service).
  • Communicating observations to the relevant stakeholders, advising on mitigation and following up on actions.
  • Adding information to the different security registers from Business Impact assessments (BIA’s), IT Security Assessments (ITSA’s), penetration/security tests, vulnerability scans, exceptions and other sources.
  • Adding information to security finding register, which contains all security assessment findings and risks that are reported within the TSCC, and is used to follow up on security assessment findings.
  • Improving and maintaining an Application Security Register, manage and follow-up on actions and register application progress.
  • Keeping track of follow-up actions and deliver management reporting.
  • Representing, on occasion, the TSCC in IT projects and intake boards where required.
  • Assessing IT security exception requests on validity and providing advice to the team lead application security and business stakeholder for acceptance or rejection including advice on additional security controls.
  • Improving procedures to keep the security registers, application registers and assessment processes up to date.
  • Creation and execution of roadmaps, standards, design patterns and frameworks, specifically on cryptography. Working together with different stakeholders within and outside of ASML e.g., external…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary