cover image
EMW

EMW

www.emw.com

18 Jobs

210 Employees

About the Company

EMW was founded in 1995 by engineers and managers who formerly held senior positions in well known telecommunications and information technology companies to pursue their vision for this new company.

Our core business is providing information and communication technology services in the areas of planning, engineering and implementation; project and program management; systems integration; operations and maintenance; and training. Our competencies range over all aspects of inside and outside plant; feeder, access and inter-office networks; switching, transmission, multiplexing and data communications equipment; network management, operations support, and asset management systems; information assurance; web enabling; applications software; and beyond. While staying abreast of today’s technologies, we keep a watchful eye on technology trends, and are very serious about future-proofing our solutions.

We play in the global marketplace, and are proud to serve a wide spectrum of distinguished clients from defense and government agencies, as well as commercial enterprise. Our watchwords are competency, innovation, integrity, and—above all—respect and care for the customer.

Listed Jobs

Company background Company brand
Company Name
EMW
Job Title
C004569 Vulnerability Assessment Engineer 3 (CTS) - FRI 9 Jan
Job Description
**Job Title** Vulnerability Assessment Engineer 3 **Role Summary** Lead on‑site technical security audits (CIS Type‑3) for networks, systems, and applications within NATO and national facilities. Analyze audit data to identify weaknesses, produce detailed findings and recommendations, and support remediation efforts. Work autonomously with minimal supervision while coordinating with multidisciplinary teams and senior stakeholders. **Expectations** - Minimum 3 years of hands‑on vulnerability assessment and security engineering experience (excluding AI‑specific roles). - Hold NATO Cosmic Top Secret clearance (CTS). - Ability to travel up to 20 days per year to Belgium and NATO/NCIA locations. - On‑site only; limited telework. **Key Responsibilities** - Plan, execute, and document CIS Security Audit Type‑3 engagements on complex networks, systems, and applications. - Perform vulnerability scans with Tenable Nessus, configure advanced settings, and create customized audit files. - Analyze assessment data, benchmark against CIS Benchmarks, NIST, and Zero Trust principles, and identify potential exploits. - Draft comprehensive audit reports, including actionable remediation recommendations. - Brief senior stakeholders and provide clear, concise presentations on findings. - Support remediation and mitigation discussions. - Contribute to development of internal tools and automation workflows for data collection and analysis. - Perform additional duties as required within secure military or government environments. **Required Skills** - Deep understanding of computer and communications security, enterprise networking, OS and application vulnerabilities. - Expertise in Zero Trust Architecture, Data‑Centric Security, and system hardening. - Proven experience with Tenable Nessus (scan planning, configuration, audit file creation). - Knowledge of Active Directory security, Azure AD/Entra ID, Office 365, and AWS Cloud Security. - Familiarity with DevSecOps practices, CI/CD pipelines, cloud‑native deployments, and Ansible automation. - Ability to assess and secure SDN, SOA, and hybrid cloud environments. - Strong scripting and automation skills (PowerShell, Python, Bash). - Experience benchmarking and mapping to industry standards (CIS, NIST). - Familiarity with AI/LLM security evaluation (optional). - Excellent verbal and written communication, stakeholder‑briefing, and technical documentation skills. - Self‑motivated, independent work ethic with proven collaboration in multidisciplinary teams. **Required Education & Certifications** - Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent professional experience). - Relevant cybersecurity certifications such as CISSP, CISM, CompTIA Security+, Nessus Certified, Azure/AWS Security, or Ansible Automation certifications are preferred.
Mons, Belgium
On site
Junior
19-12-2025
Company background Company brand
Company Name
EMW
Job Title
C004570 Dep. Service Delivery Manager - Pen Testing Services (NS) - THU 15 Jan
Job Description
Job title: Deputy Service Delivery Manager – Penetration Testing Services Role Summary: Act as the technical and managerial lead for penetration testing engagements across NATO and NCIA environments, ensuring accurate scoping, high‑quality delivery, and continuous improvement while serving as the primary liaison between testers, service management, and stakeholders. Expectations: - Deliver penetration testing services on schedule, within budget, and in alignment with NCSC PTAE and other relevant standards. - Maintain service quality, consistency, and adherence to agreed KPIs and reporting metrics. - Manage risks, dependencies, and resource allocation effectively. - Translate complex technical findings into clear, risk‑focused narratives for decision‑makers. - Contribute to methodology refinement and lessons‑learned documentation. Key Responsibilities: - Support the Service Delivery Manager in overall service delivery. - Assess scope, attack surface, constraints, and complexity of target systems; produce LoE estimates aligned with NCSC PTAE methodology. - Conduct technical scoping discussions with stakeholders; define objectives, in/out of scope, assumptions, constraints, Rules of Engagement, and deliverables. - Plan, schedule, and coordinate resources for penetration testing engagements; ensure adherence to timelines and quality standards. - Monitor engagement progress, manage risks and dependencies, and provide regular status updates. - Translate technical findings into risk‑focused language during kick‑offs, debriefings, and technical discussions. - Support service reporting, KPI dashboards, and stakeholder briefings. - Contribute to updates of testing methodologies, tools, and lessons‑learned documents. Required Skills: - Minimum 3 years of project or service delivery management experience in cybersecurity. - Deep technical expertise in penetration testing and offensive security across network, application, and cloud environments. - Proven ability to estimate effort and scope for complex technical assessments and to apply NCSC PTAE standards. - Strong understanding of the penetration testing service lifecycle, scoping, and deliverable definition. - Knowledge of OWASP, PTES, NIST/ISO‑aligned practices, and other penetration testing standards. - ITIL experience with a focus on Change Management. - Excellent stakeholder management, requirements gathering, and expectation‑setting skills. - Ability to communicate complex technical concepts as actionable risk insights to non‑technical audiences. Required Education & Certifications: - NATO Secret security clearance (mandatory). - Bachelor’s degree in Computer Science, Cybersecurity, Information Assurance, or a related field (or equivalent professional experience). - Professional certifications preferred: PTES, OSCP, CEH, CISSP, ITIL Foundation.
Mons, Belgium
On site
Junior
18-12-2025
Company background Company brand
Company Name
EMW
Job Title
C004568 Vulnerability Assessment Engineer 2 (CTS) - MON 12 Jan
Job Description
**Job Title** Vulnerability Assessment Engineer 2 (CTS) **Role Summary** Lead on‑site CIS type‑3 security audits for NATO and allied networks, systems and applications. Analyze findings, produce reports, and advise on remediation while developing in‑house assessment tooling. Operate independently with minimal supervision and maintain the highest security standards. **Expectations** - 1‑year contract (≈ 1,460 hours) starting 2 Feb 2026, ending 31 Dec 2026. - Full‑time on‑site duty; limited telework. - Up to 20 days travel within Belgium to NATO/NCIA sites. - Must hold NATO Cosmic Top Secret clearance (CTS status, no ongoing NS clearance). **Key Responsibilities** - Plan, execute, and validate on‑site CIS type‑3 security audits for networks, systems, and applications. - Collect, analyze, and report assessment data; identify security weaknesses and propose remediation. - Author comprehensive audit reports and brief senior stakeholders. - Share audit findings to support mitigation and remediation. - Contribute to the design and deployment of in‑house data‑collection and analysis toolsets. - Perform related duties as required. **Required Skills** - ≥ 3 years of practical experience in network/security engineering and vulnerability assessment in enterprise and cloud contexts. - Deep knowledge of computer/communications security, enterprise networking, OS/application vulnerabilities. - Proficient in Zero‑Trust and Data‑Centric Security principles. - Expert use of Tenable Nessus (scanning, configuration, custom plugins) and creation of Nessus audit files. - Advanced Active Directory security configuration and vulnerability assessment. - Strong experience securing hybrid/multi‑cloud (Azure AD/Entra ID, Office 365, AWS) environments. - Familiarity with DevSecOps, CI/CD pipelines, and cloud‑native security. - System hardening, endpoint protection, anti‑malware strategy, and benchmarking against CIS/NIST standards. - Knowledge of large language models (LLMs) security assessment. - Experience with Ansible automation and SDN/SOA deployments. - Scripting in PowerShell, Python, or Bash for data-processing automation. - Ability to build repeatable workflows/checklists to improve efficiency. - Excellent written and verbal communication; briefing senior stakeholders; producing high‑quality technical reports. **Required Education & Certifications** - Bachelor’s degree in Computer Science, Cybersecurity, Information Assurance or equivalent. - NATO Cosmic Top Secret clearance with current CTS status. - Certifications such as CISSP, CEH, CISM, or equivalent are highly desirable.
Mons, Belgium
On site
Junior
19-12-2025
Company background Company brand
Company Name
EMW
Job Title
C004582 Engineer (Digital Collaboration - Voice & VTC) (NS) - MON 19 Jan
Job Description
**Job Title** Engineer (Digital Collaboration – Voice & VTC) **Role Summary** Design, deploy, manage, and optimise NATO voice and video‑teleconferencing (VTC) infrastructure. Provide third‑level technical support, maintain documentation, and mentor team members. Participate in change management, innovation initiatives, and out‑of‑hours maintenance to ensure continuous, secure, and high‑quality collaboration services across the mission. **Expectations** - Maintain active NATO SECRET clearance and comply with security protocols. - Deliver reliable, secure voice/VTC services with minimal downtime. - Collaborate with project management, operations, and stakeholders to improve infrastructure. - Lead technical training and knowledge transfer within the team. - Contribute to long‑term solutions, documentation, and process improvement. **Key Responsibilities** - Perform service continuity improvement tasks on NATO voice & VTC systems. - Support innovation projects in voice and video‑conferencing technology. - Provide technical support to project management and enhance existing infrastructure. - Plan, test, and execute routine configuration and maintenance operations. - Respond to maintenance activities and deployments outside normal business hours. - Coordinate change requests (CRQs) and authorised service interruptions (ASIs). - Create and maintain technical documentation (configuration baselines, engineering reports, network diagrams, etc.). - Deliver training and mentorship on new technologies and features. - Investigate and propose long‑term solutions for equipment and configuration issues. - Deliver third‑level support for static and deployable voice and video conference infrastructures. - Deputise higher‑grade staff as required. - Perform other duties as assigned. **Required Skills** - 2+ years designing, implementing, and optimizing collaboration tools in a digital ecosystem. - Proven configuration and operation experience with voice/VTC core systems and end devices. - Deployment and configuration of security features: TLS, PKI, IPSec, etc. - Strong troubleshooting skills for QoS and complex IP network issues. - Excellent knowledge of SIP, H.323, and PSTN signalling protocols. - Working knowledge of virtualization and cloud technologies. - Experience with communication and collaboration software (video conferencing, messaging, document sharing). - Ability to provide end‑user support and training. - Knowledge of NATO responsibilities, Allied Command Operations, and Allied Command Transformation. - Strong written and verbal communication, negotiation, and influence skills. - Background in international environments combining military and civilian stakeholders. **Required Education & Certifications** - Bachelor’s degree (nationally recognised) in a related discipline **or** equivalent experience (≥ 6 years in relevant duties). - Minimum of 2 years post‑degree experience in collaboration tool deployment. - ITIL Foundation certification. - Preferred: Cisco Certified Network Professional – Collaboration (CCNP Collaboration). - Experience with major collaboration vendors (Cisco, Poly, Pexip) and monitoring platforms (e.g., CA Spectrum, nGenius One). - Scripting knowledge (Python, regular expressions) is advantageous. - Familiarity with cloud‑based collaboration solutions (Microsoft Teams, Cisco Webex).
Mons, Belgium
On site
Mid level
06-01-2026