Easy Apply
2
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

IT
SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
            Categories
            1 selected
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Communication
                          • Security service
                          • Design
                          • Development
                          • Computer science
                          • Azure Cloud Architect
                          • Application Security Architect
                          • Architect Microsoft
                          • Application Architect
                          • Application Developer
                          • Cloud Security Engineer
                          • Computer Security Manager
                          • Consultant Internet
                          • Consultant Security

                          show more
                          IT
                          Remove all filters

                          Date posted

                          Last week
                          41

                          Commute time

                          Skills








                          Categories

                          IT
                          43












                          43 results for Access Control jobs in Ternat within a 30 km radius

                          Network Security Engineer (M/F/X)

                          Vinçotte
                          Vilvoorde
                          Network Access Control (802.1X Wired/Wireless, RADIUS, TACACS, Guest Portals) - Zero Trust Network Access (ZTNA) CATO and / or zScaler
                          Network Access Control (802.1X Wired/Wireless, RADIUS, TACACS, Guest Portals) - Zero Trust Network Access (ZTNA) CATO and / or zScaler
                          more
                          Smals * Brussel * Vast contract, onbepaalde tijd * Thuiswerken mogelijk, Voltijds - Smals realiseert innovatieve ICT-projecten in e-government en e-health voor instellingen uit de sociale zekerheid en de gezondheidszorg. 'ICT for society' is voor Smals meer dan een slogan: alle projecten hebben een positieve maatschappelijke impact. Zo bouwt Smals mee aan het portaal van de sociale zekerheid en het eHealth-platform. Jouw verantwoordelijkheden - Als Database Administrator Elasticsearch ben je verantwoordelijk voor het ontwerp, de implementatie, het beheer en de optimalisatie van Elasticsearch-clusters, waarbij je de prestaties, beschikbaarheid, veiligheid en schaalbaarheid ervan garandeert. Je beheert, configureert en onderhoudt Elasticsearch-clusters (OpenSearch wordt geaccepteerd, afhankelijk van de context).
                          Smals * Brussel * Vast contract, onbepaalde tijd * Thuiswerken mogelijk, Voltijds - Smals realiseert innovatieve ICT-projecten in e-government en e-health voor instellingen uit de sociale zekerheid en de gezondheidszorg. 'ICT for society' is voor Smals meer dan een slogan: alle projecten hebben een positieve maatschappelijke impact. Zo bouwt Smals mee aan het portaal van de sociale zekerheid en het eHealth-platform. Jouw verantwoordelijkheden - Als Database Administrator Elasticsearch ben je verantwoordelijk voor het ontwerp, de implementatie, het beheer en de optimalisatie van Elasticsearch-clusters, waarbij je de prestaties, beschikbaarheid, veiligheid en schaalbaarheid ervan garandeert. Je beheert, configureert en onderhoudt Elasticsearch-clusters (OpenSearch wordt geaccepteerd, afhankelijk van de context).
                          more
                          Smals * Brussel * Vast contract, onbepaalde tijd * Thuiswerken mogelijk, Voltijds - Solliciteer als één van de eersten - Smals realiseert innovatieve ICT-projecten in e-government en e-health voor instellingen uit de sociale zekerheid en de gezondheidszorg. 'ICT for society' is voor Smals meer dan een slogan: alle projecten hebben een positieve maatschappelijke impact. Zo bouwt Smals mee aan het portaal van de sociale zekerheid en het eHealth-platform. Jouw verantwoordelijkheden - Wil jij de fundamenten leggen voor veilige softwareontwikkeling binnen overheidsprojecten? Bij Smals zoeken we een expert die applicatiebeveiliging op structurele en preventieve wijze verankert in ons ontwikkelproces. Als Security Architect ben je een strategische en technische spilfiguur binnen onze organisatie. Je werkt nauw samen met ontwikkelteams, infrastructuurarchitecten en beleidsmak
                          Smals * Brussel * Vast contract, onbepaalde tijd * Thuiswerken mogelijk, Voltijds - Solliciteer als één van de eersten - Smals realiseert innovatieve ICT-projecten in e-government en e-health voor instellingen uit de sociale zekerheid en de gezondheidszorg. 'ICT for society' is voor Smals meer dan een slogan: alle projecten hebben een positieve maatschappelijke impact. Zo bouwt Smals mee aan het portaal van de sociale zekerheid en het eHealth-platform. Jouw verantwoordelijkheden - Wil jij de fundamenten leggen voor veilige softwareontwikkeling binnen overheidsprojecten? Bij Smals zoeken we een expert die applicatiebeveiliging op structurele en preventieve wijze verankert in ons ontwikkelproces. Als Security Architect ben je een strategische en technische spilfiguur binnen onze organisatie. Je werkt nauw samen met ontwikkelteams, infrastructuurarchitecten en beleidsmak
                          more
                          Smals * Brussel * Vast contract, onbepaalde tijd * Thuiswerken mogelijk, Voltijds - Solliciteer als één van de eersten - Smals realiseert innovatieve ICT-projecten in e-government en e-health voor instellingen uit de sociale zekerheid en de gezondheidszorg. 'ICT for society' is voor Smals meer dan een slogan: alle projecten hebben een positieve maatschappelijke impact. Zo bouwt Smals mee aan het portaal van de sociale zekerheid en het eHealth-platform. Jouw verantwoordelijkheden - Als Azure Architect ben jij de strategische spil in het ontwerp, de implementatie en de optimalisatie van onze Cloud-infrastructuur. Je vertaalt complexe businessbehoeften naar schaalbare, veilige en kostenefficiënte Azure-oplossingen. Samen met een klein team van Cloud-specialisten werk je aan innovatieve projecten die onze digitale transformatie versnellen.
                          Smals * Brussel * Vast contract, onbepaalde tijd * Thuiswerken mogelijk, Voltijds - Solliciteer als één van de eersten - Smals realiseert innovatieve ICT-projecten in e-government en e-health voor instellingen uit de sociale zekerheid en de gezondheidszorg. 'ICT for society' is voor Smals meer dan een slogan: alle projecten hebben een positieve maatschappelijke impact. Zo bouwt Smals mee aan het portaal van de sociale zekerheid en het eHealth-platform. Jouw verantwoordelijkheden - Als Azure Architect ben jij de strategische spil in het ontwerp, de implementatie en de optimalisatie van onze Cloud-infrastructuur. Je vertaalt complexe businessbehoeften naar schaalbare, veilige en kostenefficiënte Azure-oplossingen. Samen met een klein team van Cloud-specialisten werk je aan innovatieve projecten die onze digitale transformatie versnellen.
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentic
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentic
                          more
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management.
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management.
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts and SIEM solutions - As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged <
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts and SIEM solutions - As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged <
                          more
                          Hemelaer * TEMSE - Solliciteer als één van de eersten - Jouw verantwoordelijkheden * Je verzorgt de eerstelijns helpdesk functie voor IT gerelateerde vragen. * Je helpt bij het beheer van het netwerk, de office 365 omgeving, toegangscontrole, Business Central, Innova en andere softwarepakketten. * Je bent verantwoordelijk voor de waarborging van alle IT-materiaal (asset beheer, opvolgen bestellingen, opvolgen herstellingen ...) * Je ondersteunt en instrueert onze in het gebruik van onze software. * Je zoekt en produceert de gevraagde informatie aan de respectievelijke diensten zowel intern als extern met de beschikbare tools zoals SQL en PowerBI. * Je maakt scripts en programma's voor de automatisatie van processen binnen ons bedrijf. Jouw profiel * Je beschikt over een goede kennis van standaard desktopprogramma's zoals de Office365 suite en bent leergierig om pakket
                          Hemelaer * TEMSE - Solliciteer als één van de eersten - Jouw verantwoordelijkheden * Je verzorgt de eerstelijns helpdesk functie voor IT gerelateerde vragen. * Je helpt bij het beheer van het netwerk, de office 365 omgeving, toegangscontrole, Business Central, Innova en andere softwarepakketten. * Je bent verantwoordelijk voor de waarborging van alle IT-materiaal (asset beheer, opvolgen bestellingen, opvolgen herstellingen ...) * Je ondersteunt en instrueert onze in het gebruik van onze software. * Je zoekt en produceert de gevraagde informatie aan de respectievelijke diensten zowel intern als extern met de beschikbare tools zoals SQL en PowerBI. * Je maakt scripts en programma's voor de automatisatie van processen binnen ons bedrijf. Jouw profiel * Je beschikt over een goede kennis van standaard desktopprogramma's zoals de Office365 suite en bent leergierig om pakket
                          more

                          No match yet? There are 35 more jobs that could match your search

                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Configure n
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Configure n
                          more
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As the threat landscape is continuously changing, you will have to identify risks in the existing architecture and to propose cyber security control improvements. You will assist with the prioritization and implementation of corrective actions to improve cyber security controls.
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As the threat landscape is continuously changing, you will have to identify risks in the existing architecture and to propose cyber security control improvements. You will assist with the prioritization and implementation of corrective actions to improve cyber security controls.
                          more
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle * Design network security including in a hybrid context with traditional network centric controls * Proficient in all aspects of cloud Security including identity and access management, organizational structure and p
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle * Design network security including in a hybrid context with traditional network centric controls * Proficient in all aspects of cloud Security including identity and access management, organizational structure and p
                          more

                          Digital Identity Consultant

                          Devoteam
                          Machelen
                          Easy Apply
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          more
                          You use configuration automation (cookbooks, roles, environments, chef-vault), Tools like Docker for service and build containers, tools for the storage of binaries and tools for version control of the code. * Version Control Systems: Proficient in using version control systems, especially Git, for source code management.
                          You use configuration automation (cookbooks, roles, environments, chef-vault), Tools like Docker for service and build containers, tools for the storage of binaries and tools for version control of the code. * Version Control Systems: Proficient in using version control systems, especially Git, for source code management.
                          more
                          Easy Apply
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          more
                          Strong telecom knowledge with focus on Managed Connectivity Services, including the following domains: Darkfiber, DWDM, (Carrier) Ethernet, MPLS-TP, IP(MPLS), xDSL, Internet, anti-DDos, Access & backhaul.
                          Strong telecom knowledge with focus on Managed Connectivity Services, including the following domains: Darkfiber, DWDM, (Carrier) Ethernet, MPLS-TP, IP(MPLS), xDSL, Internet, anti-DDos, Access & backhaul.
                          more

                          Popular Jobs


                          show more

                          Frequently Asked Questions

                          How many Access Control jobs are there in Ternat?
                          There are 43 Access Control jobs within 20 miles of Ternat available on StepStone right now.

                          What other similar jobs are there to Access Control jobs in Ternat?
                          As well as Access Control jobs in Ternat, you can find IT, Communication, Security service, amongst many others.

                          Which skills are beneficial for Access Control jobs in Ternat?
                          The following skills are useful for Access Control jobs in Ternat: Communication, Security service, Design, Development, Computer science.