Date posted
Work from home options
Commute time
Application method
Job language
Skills
Categories
Sectors
Regions
Cities
Experience
Type of Contract
Type of Work

Filters

Business
SortingRelevance
Date posted
    Work from home options
      Commute time
      Application method
        Job language
          Skills
          1 selected
            Categories
              Sectors
                Regions
                  Cities
                    Experience
                      Type of Contract
                        Type of Work

                          Popular Jobs

                          • IT
                          • Business
                          • Communication
                          • Security service
                          • Design
                          • Networks
                          • Assistant Business Development
                          • Apprentice Project Management
                          • Azure Architect
                          • Analyst Business
                          • Analytics Apprenticeship
                          • Application Security Architect
                          • Apprentice HR Assistance
                          • Architect Microsoft
                          • Azure Security Engineer

                          show more
                          Business
                          Remove all filters

                          Date posted

                          New jobs
                          6


                          Commute time

                          Skills


                          Business
                          33






                          Categories

                          IT
                          15






                          30 results for Conditional Access jobs in Vilvoorde within a 30 km radius

                          IT Architect Digital Workplace Solutions

                          Colruyt NV (Colruyt Group)
                          EDINGENSESTEENWEG 1500 HALLE
                          Kennis van security-standaarden en hun toepassing binnen het Microsoft-ecosysteem (EntraID, Conditional Access, Intune, Purview).
                          Kennis van security-standaarden en hun toepassing binnen het Microsoft-ecosysteem (EntraID, Conditional Access, Intune, Purview).
                          more
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA).
                          Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA).
                          more
                          NEW

                          No match yet? There are 28 more jobs that could match your search

                          Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          Jefferson Wells offers you a permanent contract as consultant with an attractive salary package and will give you access to trainings in technical matters and soft skills.
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, ...
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As a Privileged Access Management Architect, you will work together with other and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, ...
                          more
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with - You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management
                          Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with - You will implement and support Privileged Access security controls for our clients, based on pre-defined designs. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management
                          more
                          Extend Microsoft 365 services (SharePoint Online, Teams, etc.) with custom solutions, leveraging Power Platform integrations, and ensuring secure access through Microsoft Entra ID configurations. * Solid understanding of identity and access management principles, with experience utilizing Microsoft Entra ID for application authentication and authorization. * Microsoft Certified: Identity and Access Administrator Associate (SC-300) (Relevant for Entra ID)
                          Extend Microsoft 365 services (SharePoint Online, Teams, etc.) with custom solutions, leveraging Power Platform integrations, and ensuring secure access through Microsoft Entra ID configurations. * Solid understanding of identity and access management principles, with experience utilizing Microsoft Entra ID for application authentication and authorization. * Microsoft Certified: Identity and Access Administrator Associate (SC-300) (Relevant for Entra ID)
                          more
                          NEW
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions)
                          Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Experience working with identity governance including Role based access control, access request and certification * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions)
                          more
                          Organised individual learning tracks with access to leading online skills development platforms, to onsite and online teachers and to our global experts
                          Organised individual learning tracks with access to leading online skills development platforms, to onsite and online teachers and to our global experts
                          more
                          NEW
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle
                          more

                          Business Analyst - Fraud

                          The Capital Markets Company/CAPCO
                          Belgium - Brussels
                          Partially remote
                          Organised individual learning tracks with access to leading online skills development platforms, to onsite and online teachers and to our global experts
                          Organised individual learning tracks with access to leading online skills development platforms, to onsite and online teachers and to our global experts
                          more

                          Popular Jobs


                          show more

                          Frequently Asked Questions

                          How many Conditional Access jobs are there in Vilvoorde?
                          There are 30 Conditional Access jobs within 20 miles of Vilvoorde available on StepStone right now.

                          What other similar jobs are there to Conditional Access jobs in Vilvoorde?
                          As well as Conditional Access jobs in Vilvoorde, you can find IT, Business, Communication, amongst many others.

                          Which skills are beneficial for Conditional Access jobs in Vilvoorde?
                          The following skills are useful for Conditional Access jobs in Vilvoorde: Business, Communication, Security service, Design, Networks.

                          How many temporary and part-time Conditional Access jobs are available in Vilvoorde?
                          There are 0 temporary Conditional Access jobs and 1 part-time Conditional Access jobs available in Vilvoorde at the moment.