maintain security controls in accordance with industry best practices, such as access control lists, encryption and configuration, identify management and access control, firewall management, auditing and monitoring administrator account management, SSO, conditional access controls and password/key management. Documenting platform solutions in the following areas: Identity and access Platform protection Security operations Data security Analyst Associate Microsoft Certified: Identity and Access Administrator Associate Microsoft Certified: Information
which include, switches, wireless access points and network access control applications Network configuration of PRTG Working knowledge of Session Border Controllers (Oracle and AudioCodes) Linux skills Market Related
Establishing the needs of users and monitoring user access and security Monitoring performance and managing back-end organisation of data and front-end accessibility for end-users Refining the logical design so definitions for the data dictionary (metadata) Controlling access permissions and privileges Developing, managing
Monitor security systems, including CCTV, access control, and alarm systems, to identify and respond technologies, including physical security, access control, and surveillance systems. Excellent leadership
Monitor security systems, including CCTV, access control, and alarm systems, to identify and respond technologies, including physical security, access control, and surveillance systems. Excellent leadership
Systems, Intrusion Detection Systems, Network Access Control (NAC), and Virtual Private Networks (VPN) If
Job Description: Ownership of Outsourced Credit Control's data and processes including, but not limited Data Analysts supporting the Outsourced Credit Control team and ensuring deadlines are met. The position Apply all IT requirements in terms of: Database access policies Deployment requirements Development lifecycle
Establishing the needs of users and monitoring user access and security; Monitoring performance and managing back-end organisation of data and front-end accessibility for end-users Refining the logical design so definitions for the data dictionary (metadata) Controlling access permissions and privileges Developing, managing
peripherals. Manage user accounts, permissions, and access controls in various systems. Assist with the setup and
of phones (cell phones and IP phones), CCTV, access control, POS, video conference systems, network, workstations