also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure Privileged Account Management process Network Access Control - process and exception handling Vulnerability to report on the status of the cyber security control environments on a weekly, monthly and quarterly effectiveness and efficiency of monitoring and response controls. The consultant will contribute to Knowledge Data Leakage Prevention tool configuration Logical Access Management (AD, PAM) Information Security Operations
also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure Privileged Account Management process Network Access Control - process and exception handling Vulnerability to report on the status of the cyber security control environments on a weekly, monthly and quarterly effectiveness and efficiency of monitoring and response controls. The consultant will contribute to Knowledge Data Leakage Prevention tool configuration Logical Access Management (AD, PAM) Information Security Operations
coordination and managing regular reviews of user's access including privileged user logs and critical roles roles. Be responsible for monthly/regular controls on the ECC HR and SuccessFactors environments and completing understanding of SAP GRC Access Controls, Emergency Access Management and Access Risk Good knowledge of based permissions, Proxy access restrictions, report access Knowledge of Control and Compliance requirements
role will also entail managing Data, VoIP & CCTV IP network, and routing protocols: EIGRP, OSPF and DUTIES: IP Network Management – Manage Data, VoIP, and CCTV IP network. Keep all IP devices up to date with Manage the warranties of all hardware and software. Control licenses. Accumulate and expand knowledge – Formal
database access as well as database consistency and integrity. Respond to and resolve database access and systems. Develop, implement, and maintain change control and testing processes for modifications to databases audits. Establish appropriate end-user database access control levels and review reports. Develop routines
through the partnership, vehicle analytics, access control, visitor management, community management and Project Management program experience (Asana) Access control experience Mobile technologies and Microsoft
Security policies & implement effective security controls to protect against threats. The successful incumbent and infrastructure. Implement effective security controls to protect against threats. Develop Information infrastructures from unauthorised access. Ensure cloud security by carefully managing access and permissions. Implement solutions. Implementing warranties such as alerts and controls. Leading working groups. Creating user, technical
user interfaces, focusing on usability and accessibility. Client-Side Functionality: Implement client-side practices in front end development. Version Control: Use version control systems such as Git for code management optimizing web applications for performance and accessibility. Experience with client-side state management
with the execution, analysis, review and quality control of system-level test cases and procedures; Develop technical data and information in a clear and accessible manner, fostering strong client relationships;
the prolific spread of fast, reliable Internet access throughout Africa. You'll work with Internet Service Technical Skills: Exposure/understanding of version control and the software development lifecycle in a team