Easy Apply
2
Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Communication
                          • Proactivity
                          • Business
                          • Customer Oriented
                          • Technology
                          • Azure Architect
                          • Manager Product
                          • Assistant Business Development
                          • Apprentice Content Creator
                          • Architect Microsoft
                          • Azure Security Engineer
                          • Cloud Security Engineer
                          • Consultant Internet
                          • Developer Full Stack

                          show more

                          Locations

                          Date posted

                          New jobs
                          2


                          Commute time

                          Skills








                          Categories

                          IT
                          21






                          57 results for Conditional Access jobs in Leuven within a 30 km radius

                          Microsoft M365 Copilot Solution and Presales Architect

                          Devoteam
                          Machelen
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA).
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA).
                          more

                          No match yet? There are 56 more jobs that could match your search

                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, ...
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with - You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with - You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management
                          more
                          A structured and transparent operating model, ensuring continuous access to senior management and peer support for effective execution. * Access to ongoing development and training programs
                          A structured and transparent operating model, ensuring continuous access to senior management and peer support for effective execution. * Access to ongoing development and training programs
                          more
                          A well-defined and organised operating framework, ensuring constant access to management and colleagues for guidance, alignment, and support. * Access to ongoing development and training programs
                          A well-defined and organised operating framework, ensuring constant access to management and colleagues for guidance, alignment, and support. * Access to ongoing development and training programs
                          more
                          Whether improving your commute, keeping the lights on, providing access to clean water, or transforming skylines, our work helps people and communities thrive.
                          Whether improving your commute, keeping the lights on, providing access to clean water, or transforming skylines, our work helps people and communities thrive.
                          more
                          NEW
                          Install, configure, and maintain Genetec Security Center systems (access control, video surveillance, ANPR, intercom, etc.) * Excellent knowledge of electronic security systems (access control, CCTV, intercoms, alarm systems) * Knowledge of alarm systems, fire detection, or physical access control
                          Install, configure, and maintain Genetec Security Center systems (access control, video surveillance, ANPR, intercom, etc.) * Excellent knowledge of electronic security systems (access control, CCTV, intercoms, alarm systems) * Knowledge of alarm systems, fire detection, or physical access control
                          more
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions)
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions)
                          more

                          Digital Identity Consultant

                          Devoteam
                          Machelen
                          Easy Apply
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM).
                          more

                          Popular Jobs


                          show more

                          Frequently Asked Questions

                          How many Conditional Access jobs are there in Leuven?
                          There are 57 Conditional Access jobs within 20 miles of Leuven available on StepStone right now.

                          What other similar jobs are there to Conditional Access jobs in Leuven?
                          As well as Conditional Access jobs in Leuven, you can find IT, Communication, Proactivity, amongst many others.

                          Which skills are beneficial for Conditional Access jobs in Leuven?
                          The following skills are useful for Conditional Access jobs in Leuven: Communication, Proactivity, Business, Customer Oriented, Technology.

                          How many temporary and part-time Conditional Access jobs are available in Leuven?
                          There are 0 temporary Conditional Access jobs and 1 part-time Conditional Access jobs available in Leuven at the moment.