Candidature facile
12
Date
Options télétravail
Temps de trajet
Méthode de candidature
Langue du job
Compétences
Fonctions
Secteur
Région
Ville
Expérience
Type de contrat
Régime de travail

Critères

Anglais
Le triPertinence
Date
    Options télétravail
      Temps de trajet
      Méthode de candidature
        Langue du job
        1 sélectionné
          Compétences
            Fonctions
              Secteur
                Région
                  Ville
                    Expérience
                      Type de contrat
                        Régime de travail

                          Jobs populaires

                          • IT
                          • Communication
                          • Business
                          • Management
                          • Technologie
                          • Développement
                          • Chargé/e de produit
                          • Agent/e d'expansion des entreprises
                          • Manager de développement commercial
                          • Adhérent/e
                          • Administrateur/trice des comptes clés
                          • Consultant/e en architecture
                          • Account Executive
                          • Adjoint/e de vente
                          • Analyste business

                          Afficher plus
                          Anglais
                          Supprimer tous les filtres

                          Date

                          Nouveaux jobs dernières 24h
                          21


                          Temps de trajet

                          Langue du job


                          Anglais
                          225



                          Compétences








                          Fonctions

                          IT
                          59






                          222 résultats pour Access Management à Ixelles dans un rayon de 30 km

                          Security Architect – Privileged Access Management

                          Devoteam
                          Machelen
                          As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, CPM, PSM, AIM, CCP - PSM and CPM Connectors) * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and ...
                          As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, CPM, PSM, AIM, CCP - PSM and CPM Connectors) * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and ...
                          plus
                          The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts - Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have ...
                          The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts - Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have ...
                          plus
                          A structured and transparent operating model, ensuring continuous access to senior management and peer support for effective execution. * Lead and develop a team, fostering growth through effective people management. * Management of international client files in a multicultural context * Access to ongoing development and training programs
                          A structured and transparent operating model, ensuring continuous access to senior management and peer support for effective execution. * Lead and develop a team, fostering growth through effective people management. * Management of international client files in a multicultural context * Access to ongoing development and training programs
                          plus
                          A well-defined and organised operating framework, ensuring constant access to management and colleagues for guidance, alignment, and support. * Management of international client files in a multicultural context * Access to ongoing development and training programs
                          A well-defined and organised operating framework, ensuring constant access to management and colleagues for guidance, alignment, and support. * Management of international client files in a multicultural context * Access to ongoing development and training programs
                          plus

                          Digital Identity Cybersecurity Consultant

                          Devoteam
                          Machelen
                          Candidature facile
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          plus
                          NOUVEAU
                          As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Experience in Network Security, Cyber Defense, Vulnerability Management, Security Architecture, and Cloud Environment
                          As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Experience in Network Security, Cyber Defense, Vulnerability Management, Security Architecture, and Cloud Environment
                          plus
                          M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA). * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Champion Copilot Governance and Change Management strategies to drive user usage, measure ROI via Copilot Dashboard Analytics, and accelerate value realization. * Workplace Adoption: Strong understanding of change management principles for new technology rollouts.
                          M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA). * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Champion Copilot Governance and Change Management strategies to drive user usage, measure ROI via Copilot Dashboard Analytics, and accelerate value realization. * Workplace Adoption: Strong understanding of change management principles for new technology rollouts.
                          plus
                          Candidature facile
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          plus
                          The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Experience working with identity governance including Role based access control, access request and certification * Experience in implementing ForgeRock identity management use cases, or other IAM technologies
                          The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Experience working with identity governance including Role based access control, access request and certification * Experience in implementing ForgeRock identity management use cases, or other IAM technologies
                          plus
                          Identity and Access Management (Azure AD, RBAC) * Stakeholder Management: Collaborate effectively with technical and non-technical stakeholders to understand requirements and communicate architectural decisions. * SC-300: Identity and Access Administrator Associate,
                          Identity and Access Management (Azure AD, RBAC) * Stakeholder Management: Collaborate effectively with technical and non-technical stakeholders to understand requirements and communicate architectural decisions. * SC-300: Identity and Access Administrator Associate,
                          plus
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments. * Cloud Platforms: Deep knowledge of at least one major cloud service provider (AWS, Azure, Google Cloud Platform) and experience with cloud services management, including hybrid cloud configurations. * Infrastructure as Code (IaC): Proficiency in using tools like Terraform, Ansible, Chef, or Puppet for automating the provisioning and management of cloud and on-premises resources. * Monitoring and Management: Proficiency in using monitoring and management tools (e.g., Prometheus, Grafana) for overseeing applications and infrastructure across diverse environments. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments. * Cloud Platforms: Deep knowledge of at least one major cloud service provider (AWS, Azure, Google Cloud Platform) and experience with cloud services management, including hybrid cloud configurations. * Infrastructure as Code (IaC): Proficiency in using tools like Terraform, Ansible, Chef, or Puppet for automating the provisioning and management of cloud and on-premises resources. * Monitoring and Management: Proficiency in using monitoring and management tools (e.g., Prometheus, Grafana) for overseeing applications and infrastructure across diverse environments. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          plus
                          Refining security operations processes and technologies in the area of Managed Cybersecurity Posture (Vulnerability Management as a service), Managed Detection and Response and Identity and Access Management Reporting to the management of the client * Proven project management skills
                          Refining security operations processes and technologies in the area of Managed Cybersecurity Posture (Vulnerability Management as a service), Managed Detection and Response and Identity and Access Management Reporting to the management of the client * Proven project management skills
                          plus
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with Defender for Cloud -Endpoint Management with Intune
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with Defender for Cloud -Endpoint Management with Intune
                          plus
                          Solid understanding of identity and access management principles, with experience utilizing Microsoft Entra ID for application authentication and authorization. This role focuses on solution architecture, presales and hands-on development, incorporating modern capabilities like Microsoft Coilot for enhanced productivity, robust identity management with Microsoft Entra ID, and ensuring data governance through Microsoft Purview. * Extend Microsoft 365 services (SharePoint Online, Teams, etc.) with custom solutions, leveraging Power Platform integrations, and ensuring secure access through Microsoft Entra ID configurations. * Familiarity with application lifecycle management (ALM) principles and tools for Power Platform. * Microsoft Certified: Identity and Access Administrator Associate (SC-300) (Relevant for Entra ID)
                          Solid understanding of identity and access management principles, with experience utilizing Microsoft Entra ID for application authentication and authorization. This role focuses on solution architecture, presales and hands-on development, incorporating modern capabilities like Microsoft Coilot for enhanced productivity, robust identity management with Microsoft Entra ID, and ensuring data governance through Microsoft Purview. * Extend Microsoft 365 services (SharePoint Online, Teams, etc.) with custom solutions, leveraging Power Platform integrations, and ensuring secure access through Microsoft Entra ID configurations. * Familiarity with application lifecycle management (ALM) principles and tools for Power Platform. * Microsoft Certified: Identity and Access Administrator Associate (SC-300) (Relevant for Entra ID)
                          plus
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with for Cloud -Endpoint Management with Intune
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with for Cloud -Endpoint Management with Intune
                          plus
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Proficient in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Proficient in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle
                          plus

                          Nous avons étendu votre recherche à plus de 206 offres d’emploi similaires.

                          Ensure fit for purpose of Digital Operations solutions, and solution & business readiness for implementation – further support change management by monitoring the adoption and performance of newly implemented solutions * Hand-on experience and strong understanding of CMC Development laboratory workflows (small molecules, biologics, analytical development, sample & inventory management) Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          Ensure fit for purpose of Digital Operations solutions, and solution & business readiness for implementation – further support change management by monitoring the adoption and performance of newly implemented solutions * Hand-on experience and strong understanding of CMC Development laboratory workflows (small molecules, biologics, analytical development, sample & inventory management) Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          plus
                          Support Quality Management Systems, including validation, Quality Risk Management (QRM), and change management * Know-how of project management within the pharmaceutical or related industries - Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          Support Quality Management Systems, including validation, Quality Risk Management (QRM), and change management * Know-how of project management within the pharmaceutical or related industries - Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          plus
                          Leadership, Management, People •Extensive experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          Leadership, Management, People •Extensive experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          plus
                          Leadership, Management, People •10+ years of experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          Leadership, Management, People •10+ years of experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          plus
                          NOUVEAU
                          Composes and consolidates the overall validation project plan/report and clarifies the validation strategy to the project team, management and inspectors. * Provides input for management communication & reporting. * Good communication skills for interaction with , management, and inspectors. Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          Composes and consolidates the overall validation project plan/report and clarifies the validation strategy to the project team, management and inspectors. * Provides input for management communication & reporting. * Good communication skills for interaction with , management, and inspectors. Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          plus
                          •Extensive experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          •Extensive experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          plus
                          NOUVEAU

                          Vendor Quality Lead

                          Jefferson Wells
                          Braine-l'Alleud, Région wallonne, Belgique
                          Strong GCP background + clinical trial management understanding. * Proven experience in vendor qualification / vendor management. * Solid experience in Quality Agreements lifecycle management. * Vendor management experience in additional GxP areas (but not GMP/GDP profiles). Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          Strong GCP background + clinical trial management understanding. * Proven experience in vendor qualification / vendor management. * Solid experience in Quality Agreements lifecycle management. * Vendor management experience in additional GxP areas (but not GMP/GDP profiles). Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          plus
                          •Extensive experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          •Extensive experience in client engagement and relationship management at the CXO level - Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more.
                          plus

                          Jobs populaires


                          Afficher plus

                          Quel est le salaire moyen pour Access Management à Ixelles?

                          Salaire moyen par an
                          43.100 €

                          Le salaire moyen pour les emplois Access Management à Ixelles est de 43.100 €. Les salaires de Access Management à Ixelles vont de 36.300 € à 52.700 €.