Easy Apply
2
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Communication
                          • Business
                          • Design
                          • Security service
                          • Passion
                          • Azure Architect
                          • Application Security Architect
                          • Architect Microsoft
                          • Consultant Internet
                          • Developer Full Stack
                          • Identity Consultant
                          • Account Manager Security
                          • Application Architect
                          • Architect ICT

                          show more

                          Locations

                          Date posted

                          New jobs
                          2


                          Commute time

                          Skills








                          Categories

                          IT
                          20






                          26 results for Conditional Access jobs in Flemish Brabant within a 30 km radius

                          Account Manager - Microsoft Security Solutions (Employee or Freelancer)

                          Talents4You N.V.
                          Zellik
                          Microsoft Entra (IAM, Conditional Access, Privileged Identity Management)
                          Microsoft Entra (IAM, Conditional Access, Privileged Identity Management)
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA).
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA).
                          more

                          No match yet? There are 22 more jobs that could match your search

                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, ...
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with - You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with - You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management
                          more
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions)
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions)
                          more

                          Digital Identity Consultant

                          Devoteam
                          Machelen
                          Easy Apply
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          more
                          Easy Apply
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          more
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle
                          more
                          Whether improving your commute, keeping the lights on, providing access to clean water, or transforming skylines, our work helps people and communities thrive.
                          Whether improving your commute, keeping the lights on, providing access to clean water, or transforming skylines, our work helps people and communities thrive.
                          more
                          NEW
                          Extend Microsoft 365 services (SharePoint Online, Teams, etc.) with custom solutions, leveraging Power Platform integrations, and ensuring secure access through Microsoft Entra ID configurations. * Solid understanding of identity and access management principles, with experience utilizing Microsoft Entra ID for application authentication and authorization. * Microsoft Certified: Identity and Access Administrator Associate (SC-300) (Relevant for Entra ID)
                          Extend Microsoft 365 services (SharePoint Online, Teams, etc.) with custom solutions, leveraging Power Platform integrations, and ensuring secure access through Microsoft Entra ID configurations. * Solid understanding of identity and access management principles, with experience utilizing Microsoft Entra ID for application authentication and authorization. * Microsoft Certified: Identity and Access Administrator Associate (SC-300) (Relevant for Entra ID)
                          more
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data.
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data.
                          more
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments.
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments.
                          more
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle * Proficient in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes.
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle * Proficient in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes.
                          more

                          Popular Jobs


                          show more

                          Frequently Asked Questions

                          How many Conditional Access jobs are there in Flemish Brabant?
                          There are 26 Conditional Access jobs within 20 miles of Flemish Brabant available on StepStone right now.

                          What other similar jobs are there to Conditional Access jobs in Flemish Brabant?
                          As well as Conditional Access jobs in Flemish Brabant, you can find IT, Communication, Business, amongst many others.

                          Which skills are beneficial for Conditional Access jobs in Flemish Brabant?
                          The following skills are useful for Conditional Access jobs in Flemish Brabant: Communication, Business, Design, Security service, Passion.