Snel solliciteren
3
Publicatiedatum
Opties voor telewerken
Reistijd
Sollicitatie methode
Taal van de job
Vaardigheden
Functiecategorie
Sector
Regio
Gemeente
Ervaringsniveau
Type contract
Voltijds/deeltijds

Filters

Informatica
Sorteer volgensRelevantie
Publicatiedatum
    Opties voor telewerken
      Reistijd
      Sollicitatie methode
        Taal van de job
          Vaardigheden
          1 geselecteerd
            Functiecategorie
            1 geselecteerd
              Sector
                Regio
                  Gemeente
                    Ervaringsniveau
                      Type contract
                        Voltijds/deeltijds

                          Begeerde jobs

                          • IT
                          • Informatica
                          • Communicatie
                          • Ontwerpbeginselen
                          • Management
                          • Technology
                          • SCRUM master
                          • Web Adviseur/euse
                          • .NET Architect
                          • .NET developer
                          • Accountant boekhouding
                          • Admin
                          • Adviseur informatiebeveiliging
                          • Adviseur/euse Analyse
                          • Agile Coach

                          Toon meer

                          Locaties

                          Informatica
                          Verwijder alle filters

                          Publicatiedatum

                          Jobs laatste 24 uur
                          2


                          Reistijd

                          Vaardigheden


                          Informatica
                          34






                          Functiecategorie

                          IT
                          34












                          21 resultaten voor Access Management in Hove binnen een straal van 30 km

                          Security Architect – Privileged Access Management

                          Devoteam
                          Machelen
                          As a Privileged Access Management Architect, you will work together with other Devoteam members and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, CPM, PSM, AIM, CCP - PSM and CPM Connectors) * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access ...
                          As a Privileged Access Management Architect, you will work together with other Devoteam members and our clients to develop and enhance their current privileged access management solutions, focusing on operational, process and resource efficiency. You will mainly support transformational projects including the integration and interaction of privileged access management, governance and privileged identity, to provide a holistic identity solution for our clients across their employees, suppliers, and customers. * Knowledge and implementation experience in the design, engineering and deployment of Privileged Access Management solutions, ideally on CyberArk (CyberArk PAS Suite, CPM, PSM, AIM, CCP - PSM and CPM Connectors) * Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access ...
                          meer
                          The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts - Our Cyber Security consultants leverages technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have ...
                          The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts - Our Cyber Security consultants leverages technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have ...
                          meer
                          M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA). * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Champion Copilot Governance and Change Management strategies to drive user usage, measure ROI via Copilot Dashboard Analytics, and accelerate value realization. * Workplace Adoption: Strong understanding of change management principles for new technology rollouts.
                          M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA). * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Champion Copilot Governance and Change Management strategies to drive user usage, measure ROI via Copilot Dashboard Analytics, and accelerate value realization. * Workplace Adoption: Strong understanding of change management principles for new technology rollouts.
                          meer

                          Digital Identity Consultant

                          Devoteam
                          Machelen
                          Snel solliciteren
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          meer
                          Snel solliciteren
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          You are an expert in Identity and Access Management (IAM) and advise organizations on how they can securely and efficiently manage their digital identities, optimize the user experience, and comply with ever-changing laws and regulations. * Designing and implementing Digital Identity solutions, including Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Customer Identity and Access Management (CIAM). As a Digital Identity Consultant, you will play a crucial role in helping our clients design, implement, and manage robust and future-proof solutions for digital identity management. * Staying up-to-date with the latest trends and developments within Digital Identity, such as Zero Trust, decentralized identity (Self-Sovereign Identity - SSI), blockchain, AI in identity management, biometric authentication, and the European Digital Identity (eIDAS2).
                          meer
                          As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Experience in Network Security, Cyber Defense, Vulnerability Management, Security Architecture, and Cloud Environment
                          As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Experience in Network Security, Cyber Defense, Vulnerability Management, Security Architecture, and Cloud Environment
                          meer
                          The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Experience working with identity governance including Role based access control, access request and certification * Experience in implementing ForgeRock identity management use cases, or other IAM technologies
                          The person we are looking for combines the qualities of a good communicator and an expert in the domains of Identity and Access Management. * Familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, SIEM Solutions) Our IAM consultants leverages methodologies of a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Experience working with identity governance including Role based access control, access request and certification * Experience in implementing ForgeRock identity management use cases, or other IAM technologies
                          meer
                          Identity and Access Management (Azure AD, RBAC) * Stakeholder Management: Collaborate effectively with technical and non-technical stakeholders to understand requirements and communicate architectural decisions. * SC-300: Identity and Access Administrator Associate,
                          Identity and Access Management (Azure AD, RBAC) * Stakeholder Management: Collaborate effectively with technical and non-technical stakeholders to understand requirements and communicate architectural decisions. * SC-300: Identity and Access Administrator Associate,
                          meer
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments. * Cloud Platforms: Deep knowledge of at least one major cloud service provider (AWS, Azure, Google Cloud Platform) and experience with cloud services management, including hybrid cloud configurations. * Infrastructure as Code (IaC): Proficiency in using tools like Terraform, Ansible, Chef, or Puppet for automating the provisioning and management of cloud and on-premises resources. * Monitoring and Management: Proficiency in using monitoring and management tools (e.g., Prometheus, Grafana) for overseeing applications and infrastructure across diverse environments. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments. * Cloud Platforms: Deep knowledge of at least one major cloud service provider (AWS, Azure, Google Cloud Platform) and experience with cloud services management, including hybrid cloud configurations. * Infrastructure as Code (IaC): Proficiency in using tools like Terraform, Ansible, Chef, or Puppet for automating the provisioning and management of cloud and on-premises resources. * Monitoring and Management: Proficiency in using monitoring and management tools (e.g., Prometheus, Grafana) for overseeing applications and infrastructure across diverse environments. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          meer
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Proficient in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle
                          As an Azure Security Architect, you should have experience in all aspects of Azure security including designing security controls and threat protection, analysing and creating a solid identity and access management structure, and defining security policiesusing Azure technologies. * Proficient in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes. * Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. * Design access configurations within a cloud solution environment using the defense-in-depth principle
                          meer

                          We hebben je zoekopdracht uitgebreid met 11 gelijkaardige vacatures.

                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data.
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data.
                          meer
                          Opbouwen van specialistische kennis in energiemanagement en home automation technologieën * Samenwerken met Product Management en R&D aan structurele oplossingen * Ervaring in de home automation, energiemanagement of smart building sector is een sterke troef * Begrip van energiemanagement systemen en IT-netwerken in een smart home omgeving
                          Opbouwen van specialistische kennis in energiemanagement en home automation technologieën * Samenwerken met Product Management en R&D aan structurele oplossingen * Ervaring in de home automation, energiemanagement of smart building sector is een sterke troef * Begrip van energiemanagement systemen en IT-netwerken in een smart home omgeving
                          meer
                          •CI/CD Pipeline Setup and Management: Design, implement, and maintain CI/CD pipelines. •Infrastructure management: Use Infrastructure as code tools to provision and manage test and development environments. •Hands-on experience with version control systems (Git, Bitbucket) and configuration management tools (e.g., Ansible, Puppet, Chef). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          •CI/CD Pipeline Setup and Management: Design, implement, and maintain CI/CD pipelines. •Infrastructure management: Use Infrastructure as code tools to provision and manage test and development environments. •Hands-on experience with version control systems (Git, Bitbucket) and configuration management tools (e.g., Ansible, Puppet, Chef). •Knowledge of security best practices for embedded systems, including firmware integrity, code signing, and vulnerability management.
                          meer
                          •Experience in communicating with , other technical teams, and management to collect requirements, identify tasks, provide estimates, and meet production deadlines.
                          •Experience in communicating with , other technical teams, and management to collect requirements, identify tasks, provide estimates, and meet production deadlines.
                          meer
                          All to be integrated in the cloud for automated node management. * Infrastructure as Code (IaC): Experience with tools like Terraform, Ansible, Chef, or Puppet for automating the setup and management of infrastructure. * Cloud Platforms: Proficiency in cloud services (AWS, Azure, Google Cloud Platform) including the management of cloud infrastructure and services. * Version Control Systems: Proficient in using version control systems, especially Git, for source code management. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          All to be integrated in the cloud for automated node management. * Infrastructure as Code (IaC): Experience with tools like Terraform, Ansible, Chef, or Puppet for automating the setup and management of infrastructure. * Cloud Platforms: Proficiency in cloud services (AWS, Azure, Google Cloud Platform) including the management of cloud infrastructure and services. * Version Control Systems: Proficient in using version control systems, especially Git, for source code management. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          meer
                          Architect solutions using Azure PaaS services such as Azure App Service, Azure SQL Database, Azure Cosmos DB, Azure Storage, Azure Service Bus, Azure Event Grid, and API Management. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault). * Knowledge of API design and management best practices.
                          Architect solutions using Azure PaaS services such as Azure App Service, Azure SQL Database, Azure Cosmos DB, Azure Storage, Azure Service Bus, Azure Event Grid, and API Management. * Solid understanding of networking, security, and identity management concepts in Azure (e.g., Azure Active Directory, VNETs, NSGs, Azure Key Vault). * Knowledge of API design and management best practices.
                          meer
                          Automation & Infrastructure as Code (IaC): Drive the adoption of IaC principles and tools(e.g., Terraform, CloudFormation, Ansible) to automate infrastructure provisioning, configuration, and management. * Deployment and management of kubernetes flavors (EKS, AKS, Openshift)
                          Automation & Infrastructure as Code (IaC): Drive the adoption of IaC principles and tools(e.g., Terraform, CloudFormation, Ansible) to automate infrastructure provisioning, configuration, and management. * Deployment and management of kubernetes flavors (EKS, AKS, Openshift)
                          meer
                          Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Experience with Risk Management Projects, Business Continuity Management and Internal Audit to meet regulatory requirements * Experience of working in an environment where you have delivered risk management solutions to clients in a complex technical environment, meaning assessment, design and implementation.
                          Master's in computer science/Engineer or relevant work experience in IT Security with a preference of experience in Risk management. * Experience with Risk Management Projects, Business Continuity Management and Internal Audit to meet regulatory requirements * Experience of working in an environment where you have delivered risk management solutions to clients in a complex technical environment, meaning assessment, design and implementation.
                          meer

                          We hebben je zoekopdracht uitgebreid met 13 vacatures buiten de geselecteerde regio

                          In dit kader definieer je en onderhoud je de architecturale plannen, je stelt de ontwikkelingsstandaarden en het algemeen technisch kader op alsook de standaarden verbonden aan "Application Lifecycle Management” en "Continuous integration”. Je bent goed vertrouwd met de concepten “Continuous Integration”, “Application Lifecycle Management” (TFS, Sharepoint, MSBuild) en "DevOps".
                          In dit kader definieer je en onderhoud je de architecturale plannen, je stelt de ontwikkelingsstandaarden en het algemeen technisch kader op alsook de standaarden verbonden aan "Application Lifecycle Management” en "Continuous integration”. Je bent goed vertrouwd met de concepten “Continuous Integration”, “Application Lifecycle Management” (TFS, Sharepoint, MSBuild) en "DevOps".
                          meer
                          Je staat ook in voor het adviseren en beïnvloeden van het management om een Agile mindset te creëren en te versterken. Je faciliteert de Scrum-ceremonies en je ondersteunt de teams bij change management, conflicten, …
                          Je staat ook in voor het adviseren en beïnvloeden van het management om een Agile mindset te creëren en te versterken. Je faciliteert de Scrum-ceremonies en je ondersteunt de teams bij change management, conflicten, …
                          meer
                          Le management est accessible et proche des équipes, favorisant une communication ouverte et des échanges directs. * Avantages humains : équipe dynamique et soudée, management accessible, participation aux décisions financières et administratives, opportunités de formation et de développement.
                          Le management est accessible et proche des équipes, favorisant une communication ouverte et des échanges directs. * Avantages humains : équipe dynamique et soudée, management accessible, participation aux décisions financières et administratives, opportunités de formation et de développement.
                          meer
                          NIEUW
                          Je bevordert en ondersteunt tevens de samenwerking met externe en teams (security, service management, development, ...). Je bent vertrouwd met change- en incidentmanagementprocessen en hebt een goede kennis van Jira.
                          Je bevordert en ondersteunt tevens de samenwerking met externe en teams (security, service management, development, ...). Je bent vertrouwd met change- en incidentmanagementprocessen en hebt een goede kennis van Jira.
                          meer

                          Begeerde jobs


                          Toon meer

                          Wat is het gemiddelde salaris voor Access Management in Hove?

                          Gemiddeld salaris per jaar
                          43.100 €

                          Het salaris gemiddelde voor een Access Management in Hove is 43.100 €. De salarissen van Access Management in Hove variëren van 36.300 € tot 52.700 €.