services industry is looking to hire an Identity Access Management (IAM) Specialist to be based at their the NetIQ based Access and Review software that Sanlam uses to implement role-based access for business provisioning, de-provisioning, account monitoring, access reviews and authentication support. The analysis implementation of the technical requirements of identity and access management (IAM) projects, including automated harvesting, role based provisioning (RBAC) NetIQ Access Review Python and Powershell development skills
years of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security
privileges, need-to-know, separation of duties, access controls, encryptionKey Processes
preparedness
recruiting for a Cyber Security and Identify and Access Management Consultant. Contract role until December years of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security privileges, need-to-know, separation of duties, access controls, encryption Key Processes Supported: This preparedness Set and implement user access controls and identity and access management systems Monitor network Document network, system, and application user access control procedures and feedback to management to
new features, migrating data, and managing user access. Proven expertise in Microsoft 365 suite, including AD, and Microsoft Defender. Your expertise will directly contribute to our client's success and satisfaction Written offers based on pre-employment conditions. No direct link: Advert is not tied to Kontak Recruitment AD, and Microsoft Defender. Your expertise will directly contribute to our client's success and satisfaction new features, migrating data, and managing user access. Proven expertise in Microsoft 365 suite, including
coordination and managing regular reviews of user's access including privileged user logs and critical roles understanding of SAP GRC Access Controls, Emergency Access Management and Access Risk Good knowledge of Groups, Role based permissions, Proxy access restrictions, report access Knowledge of Control and Compliance
such as user account creation, user onboarding and access permission changes Put in place mechanisms to ensure including screen customisation, server scripts and access rights to meet business needs Write and maintain Customer Support Experience providing systems support direct to end users Demonstrate high levels of customer
also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure reports Privileged Account Management process Network Access Control - process and exception handling Vulnerability Data Leakage Prevention tool configuration Logical Access Management (AD, PAM) Information Security Operations
also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure reports Privileged Account Management process Network Access Control - process and exception handling Vulnerability Data Leakage Prevention tool configuration Logical Access Management (AD, PAM) Information Security Operations
and launching and enforcing access control policies. Managing the access points, IP telephony, PaBX and of Cisco range of switches, routers and wireless access points. VoIP Service support. Advanced / expert
system security. Controlling and monitoring user access to the database. Monitoring and optimizing the tuning, and capacity planning. Optimize database access and allocates/re-allocates database resources for