Analyst to join their dynamic team. You will manage access to domain resources and business systems. This security administration and user provisioning to network resources and internal Business systems, and administration Application environments. Perform password resets and access revocations. Implement and maintain security roles the user account lifecycle. Develop and update access control lists. Process security authorization requests maintain access to securable network resources (share folders, network drives, Internet access). Document
vandenbergmediro-ict.co.za Logical Access Review Process (Extract Preparation, Quarterly logical access review, Semi-Annual Semi-Annual logical access reviews, Annual Access Profile content reviews) Logical Access Review and Validation Validation of various application accesses Monthly Change Management review Assistance with Sarbanes-Oxley
onboarding of upcoming technologies into Privileged Access Management. Working with the Privileged Account extend your knowledge in the field of Identity and Access Management and Privileged Account Management. Keep understanding. Advantageous: Identity and Access Management. Privileged Access Management (CyberArk, BeyondTrust Demonstrated experience specifically with Privileged Access Management (PAM) solutions, such as CyberArk, BeyondTrust
Company based in Rosebank is looking for a Time & Access Specialist, on a hybrid basis. Must be willing specialists concerning Time and Attendance for all Access control Infrastructure. Manage all risks relating & Attendance management systems, including access control systems and hardware. Integration Planning:
& On Premises) of the virtual desktop, App and access infrastructure for internal and external partners infrastructure, network and integration issues. Experience with VMWare Workspace One Access. Experience with
on occasional standby. AWS technologies: AWS Networking, SQS, SNS, Kinesis, Lambda, RDS, EKS, ElastiCache ElastiCache, Aurora, VPC. Azure technologies: Azure networking, SQL, Azure Functions, Azure Monitor. Kubernetes
on occasional standby. AWS technologies: AWS Networking, SQS, SNS, Kinesis, Lambda, RDS, EKS, ElastiCache ElastiCache, Aurora, VPC. Azure technologies: Azure networking, SQL, Azure Functions, Azure Monitor. Kubernetes
Foundation. Advantageous: Identity and Access Management. Privileged Access Management (CyberArk, BeyondTrust
) Exposure to troubleshooting infrastructure, network and integration issues. A university degree/diploma
za Key responsibilities include troubleshooting network problems, configuring operating systems, and leveraging