Publicatiedatum
Opties voor telewerken
Reistijd
Sollicitatie methode
Taal van de job
Vaardigheden
Functiecategorie
Sector
Regio
Gemeente
Ervaringsniveau
Type contract
Voltijds/deeltijds

Filters

Management
Sorteer volgensRelevantie
Publicatiedatum
    Opties voor telewerken
      Reistijd
      Sollicitatie methode
        Taal van de job
          Vaardigheden
          1 geselecteerd
            Functiecategorie
            1 geselecteerd
              Sector
                Regio
                  Gemeente
                    Ervaringsniveau
                      Type contract
                        Voltijds/deeltijds

                          Begeerde jobs

                          • IT
                          • Management
                          • Communicatie
                          • Beveiligingsdienst
                          • Ontwerpbeginselen
                          • Architectuur
                          • Ict projectleider
                          • Admin
                          • Baas
                          • Security Adviseur/euse
                          • Strategisch adviseur
                          • .NET developer
                          • Adviseur/euse Chef
                          • Applicatie consultant/e
                          • Azure Architect

                          Toon meer
                          Management
                          Verwijder alle filters

                          Publicatiedatum

                          Jobs laatste 24 uur
                          7


                          Reistijd

                          Vaardigheden


                          Management
                          41






                          Functiecategorie

                          IT
                          41












                          40 resultaten voor Access Management in Lot binnen een straal van 30 km

                          Azure Architect

                          Smals
                          Brussel
                          Thuiswerken mogelijk
                          Je hebt minstens 3 jaar ervaring in Azure-omgevingen en een sterke expertise in Azure Networking, Cost Management, Governance en Security, Automation via Bicep of PowerShell.
                          Je hebt minstens 3 jaar ervaring in Azure-omgevingen en een sterke expertise in Azure Networking, Cost Management, Governance en Security, Automation via Bicep of PowerShell.
                          meer
                          The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts - Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have ...
                          The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernize the enterprise cybersecurity model in working with * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts - Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have ...
                          meer
                          As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Experience in Network Security, Cyber Defense, Vulnerability Management, Security Architecture, and Cloud Environment
                          As an Azure Security Engineer, you should be hands-on in all aspects of Azure security including implementing security controls and threat protection, managing identity and access management, implementing security policies, using Azure technologies. Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. * Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that data, apps, containers, infrastructure, and networks are protected. * Configure access within a cloud solution environment using the defense-in-depth principle * Experience in Network Security, Cyber Defense, Vulnerability Management, Security Architecture, and Cloud Environment
                          meer
                          M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA). * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Champion Copilot Governance and Change Management strategies to drive user usage, measure ROI via Copilot Dashboard Analytics, and accelerate value realization. * Workplace Adoption: Strong understanding of change management principles for new technology rollouts.
                          M365 Security & Compliance: Microsoft Purview (DLP, Sensitivity Labels, eDiscovery) and Entra ID (Access Management, MFA). * Design end-to-end Copilot architectures that focus on the readiness, security, and extensibility of the Microsoft 365 environment, leveraging services like Microsoft Purview (DLP, Retention, Sensitivity Labels) and Entra ID (Identity, Conditional Access, Permissions Hygiene). * Champion Copilot Governance and Change Management strategies to drive user usage, measure ROI via Copilot Dashboard Analytics, and accelerate value realization. * Workplace Adoption: Strong understanding of change management principles for new technology rollouts.
                          meer
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with for Cloud -Endpoint Management with Intune
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with for Cloud -Endpoint Management with Intune
                          meer
                          NIEUW
                          Refining security operations processes and technologies in the area of Managed Cybersecurity Posture (Vulnerability Management as a service), Managed Detection and Response and Identity and Access Management Reporting to the management of the client * Proven project management skills
                          Refining security operations processes and technologies in the area of Managed Cybersecurity Posture (Vulnerability Management as a service), Managed Detection and Response and Identity and Access Management Reporting to the management of the client * Proven project management skills
                          meer
                          NIEUW
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with Defender for Cloud -Endpoint Management with Intune
                          -Identity and Access Management with Entra ID * Assisting clients in leveraging cloud integrated analysis and reporting solutions to identify enable proactive threat detection, response automation, and compliance management. -Cloud Security Posture Management with Defender for Cloud -Endpoint Management with Intune
                          meer
                          Identity and Access Management (Azure AD, RBAC) * Stakeholder Management: Collaborate effectively with technical and non-technical stakeholders to understand requirements and communicate architectural decisions. * SC-300: Identity and Access Administrator Associate,
                          Identity and Access Management (Azure AD, RBAC) * Stakeholder Management: Collaborate effectively with technical and non-technical stakeholders to understand requirements and communicate architectural decisions. * SC-300: Identity and Access Administrator Associate,
                          meer
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments. * Cloud Platforms: Deep knowledge of at least one major cloud service provider (AWS, Azure, Google Cloud Platform) and experience with cloud services management, including hybrid cloud configurations. * Infrastructure as Code (IaC): Proficiency in using tools like Terraform, Ansible, Chef, or Puppet for automating the provisioning and management of cloud and on-premises resources. * Monitoring and Management: Proficiency in using monitoring and management tools (e.g., Prometheus, Grafana) for overseeing applications and infrastructure across diverse environments. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          Security: Knowledge of cloud security principles and technologies, including identity and access management (IAM), firewalls, and encryption, tailored to safeguarding hybrid environments. * Cloud Platforms: Deep knowledge of at least one major cloud service provider (AWS, Azure, Google Cloud Platform) and experience with cloud services management, including hybrid cloud configurations. * Infrastructure as Code (IaC): Proficiency in using tools like Terraform, Ansible, Chef, or Puppet for automating the provisioning and management of cloud and on-premises resources. * Monitoring and Management: Proficiency in using monitoring and management tools (e.g., Prometheus, Grafana) for overseeing applications and infrastructure across diverse environments. * Project Management: Basic project management skills to handle taskstimelines, deliverables.
                          meer

                          We hebben je zoekopdracht uitgebreid met 30 gelijkaardige vacatures.

                          • Information Governance & Records Management: retentielabels/-beleid, datalifecycle • Insider Risk Management: beleidsconfiguratie, alert tuning, response flows • Defender for Cloud Apps: app discovery, conditional access-integratie, cloud governance • Sterke communicatie- en stakeholdermanagementvaardigheden
                          • Information Governance & Records Management: retentielabels/-beleid, datalifecycle • Insider Risk Management: beleidsconfiguratie, alert tuning, response flows • Defender for Cloud Apps: app discovery, conditional access-integratie, cloud governance • Sterke communicatie- en stakeholdermanagementvaardigheden
                          meer
                          Security Operations & SOC Management * Collaborate with to maintain “Purdue Model” separation and secure remote access points.
                          Security Operations & SOC Management * Collaborate with to maintain “Purdue Model” separation and secure remote access points.
                          meer
                          You've already rolled up your sleeves in network and firewall management — think design, setup, config, upgrades — and you know your way around operational environments. - Zero Trust Network Access (ZTNA) CATO and / or zScaler - Network Access Control (802.1X Wired/Wireless, RADIUS, TACACS, Guest Portals) - Vulnerability management: Nessus, MS Defender or Qualys
                          You've already rolled up your sleeves in network and firewall management — think design, setup, config, upgrades — and you know your way around operational environments. - Zero Trust Network Access (ZTNA) CATO and / or zScaler - Network Access Control (802.1X Wired/Wireless, RADIUS, TACACS, Guest Portals) - Vulnerability management: Nessus, MS Defender or Qualys
                          meer
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data.
                          Our Cyber Security consultants leverage technologies of trusted partners to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data.
                          meer
                          Design end-to-end electronic security solutions (access control, CCTV, intrusion, PSIM, analytics, etc.) Supplier & Portfolio Management * Act as a bridge between Sales, Operations, Service Management, Finance and Sales Support * Strong knowledge of electronic security technologies (access control, CCTV, intrusion, analytics, PSIM, AI, etc.) * Familiarity with project, sales and service management methodologies (Agile, Prince2, ITIL, Miller Heiman is a plus) * Team player with strong stakeholder management skills
                          Design end-to-end electronic security solutions (access control, CCTV, intrusion, PSIM, analytics, etc.) Supplier & Portfolio Management * Act as a bridge between Sales, Operations, Service Management, Finance and Sales Support * Strong knowledge of electronic security technologies (access control, CCTV, intrusion, analytics, PSIM, AI, etc.) * Familiarity with project, sales and service management methodologies (Agile, Prince2, ITIL, Miller Heiman is a plus) * Team player with strong stakeholder management skills
                          meer
                          Kennis en ervaring – Je hebt minstens 5 jaar ervaring in IT Project Management en kennis van kennis van PMBoK, Agile of Prince2. * Sterk in stakeholdermanagement – Je hebt ervaring met het managen van verwachtingen en het opbouwen van relaties met verschillende partijen, zowel intern als extern.
                          Kennis en ervaring – Je hebt minstens 5 jaar ervaring in IT Project Management en kennis van kennis van PMBoK, Agile of Prince2. * Sterk in stakeholdermanagement – Je hebt ervaring met het managen van verwachtingen en het opbouwen van relaties met verschillende partijen, zowel intern als extern.
                          meer
                          NIEUW
                          Daarnaast organiseer je het change-managementproces en ondersteun je de ontwikkeling en evolutie van de 'Best practices' binnen de afdeling. Je neemt een motiverende, adviserende en faciliterende rol aan ten aanzien van het management en de business units en werkt nauw met hen samen. Verder zorg je voor een goed people management waarbij je de betrokken medewerkers stimuleert, coördineert en motiveert tijdens de realisatie van de projecten.
                          Daarnaast organiseer je het change-managementproces en ondersteun je de ontwikkeling en evolutie van de 'Best practices' binnen de afdeling. Je neemt een motiverende, adviserende en faciliterende rol aan ten aanzien van het management en de business units en werkt nauw met hen samen. Verder zorg je voor een goed people management waarbij je de betrokken medewerkers stimuleert, coördineert en motiveert tijdens de realisatie van de projecten.
                          meer
                          • Je definieert de processen voor master data en repository management. Je hebt bij voorkeur kennis van metadatamanagement en de master data management (MDM).
                          • Je definieert de processen voor master data en repository management. Je hebt bij voorkeur kennis van metadatamanagement en de master data management (MDM).
                          meer
                          NIEUW
                          Je staat ook in voor het adviseren en beïnvloeden van het management om een Agile mindset te creëren en te versterken. Je faciliteert de Scrum-ceremonies en je ondersteunt de teams bij change management, conflicten, …
                          Je staat ook in voor het adviseren en beïnvloeden van het management om een Agile mindset te creëren en te versterken. Je faciliteert de Scrum-ceremonies en je ondersteunt de teams bij change management, conflicten, …
                          meer
                          Je bevordert en ondersteunt tevens de samenwerking met externe en teams (security, service management, development, ...). Je bent vertrouwd met change- en incidentmanagementprocessen en hebt een goede kennis van Jira.
                          Je bevordert en ondersteunt tevens de samenwerking met externe en teams (security, service management, development, ...). Je bent vertrouwd met change- en incidentmanagementprocessen en hebt een goede kennis van Jira.
                          meer
                          Je hebt geweldige interpersoonlijke vaardigheden en bent in staat je visie te delen met de klanten en het management. Je hebt ook een goede kennis van MS Office en van de contentmanagementsystemen.
                          Je hebt geweldige interpersoonlijke vaardigheden en bent in staat je visie te delen met de klanten en het management. Je hebt ook een goede kennis van MS Office en van de contentmanagementsystemen.
                          meer
                          Je zet sterk in op begeleiding, coaching en change management en moedigt persoonlijke ontwikkeling aan. - Tot slot sta je ook in voor rapportering naar het hoger management en stem je regelmatig af met interne stakeholders (PMO, …) om de samenwerking verder te verbeteren.
                          Je zet sterk in op begeleiding, coaching en change management en moedigt persoonlijke ontwikkeling aan. - Tot slot sta je ook in voor rapportering naar het hoger management en stem je regelmatig af met interne stakeholders (PMO, …) om de samenwerking verder te verbeteren.
                          meer
                          Ervaring met IT project en budget management praktijken. * Bewezen ervaring in people management en het beheer van complexe projecten.
                          Ervaring met IT project en budget management praktijken. * Bewezen ervaring in people management en het beheer van complexe projecten.
                          meer

                          Begeerde jobs


                          Toon meer

                          Wat is het gemiddelde salaris voor Access Management in Lot?

                          Gemiddeld salaris per jaar
                          43.100 €

                          Het salaris gemiddelde voor een Access Management in Lot is 43.100 €. De salarissen van Access Management in Lot variëren van 36.300 € tot 52.700 €.