Assess, evaluate, and monitor the adequacy, effectiveness and efficiency of the organizations internal control systems. Identify improvements and enhancements to the internal control systems. Risk Management - Identify risk areas and implement controls and systems to address these. Investigate breac
Postgraduate degree, an RE5, a minimum of 5 years in the Health or Employee Benefits industry, at least 5-7 years
advancing Public Health through genomic epidemiology is sought by leading Public Health Consortium. You JSON/JSONb, be familiar with Genomic databases such as ENA & NCBI, have knowledge of biological sequence /JSONb). Familiarity of Genomic Databases (i.e., ENA, NCBI etc.). Knowledge of biological sequence formats
Provincial and National Department of Health and other health officials.
Introduction Wits Health Consortium (Pty) Limited ("WHC") is a wholly-owned Company of the University Johannesburg (South Africa) under its Faculty of Health Sciences. WHC provides Faculty with a legal framework IT/Computer or Health Sciences Required work experience: 2-3 years experience in a Health Informatics system advertisement on behalf of their client Wits Health Consortium. Wits Health Consortium will only respond to shortlisted
Introduction Wits Health Consortium (Pty) Limited ("WHC") is a wholly-owned Company of the University Johannesburg (South Africa) under its Faculty of Health Sciences. WHC provides Faculty with a legal framework IT/Computer or Health Sciences Required work experience: 2-3 years experience in a Health Informatics system advertisement on behalf of their client Wits Health Consortium. Wits Health Consortium will only respond to shortlisted
Tracking unit health check 2. Validation of tracking units for repairs 3. Camera health check 4. Validation
li>Bachelor’s Degree in IT/Computer or Health Sciences
Required experience:
Identity and Access Management (IAM) Perform daily health checks for the IAM solution and remediate accordingly privileges. Vulnerability Management (VM) Perform daily health checks for the VM solution and remediate accordingly vulnerabilities. Network Security Perform daily health checks for the network access control solution their enhancement. Data Protection Perform daily health checks for the data leakage prevention solution Identity and Access Management (IAM) Perform daily health checks for the IAM solution and remediate accordingly
Identity and Access Management (IAM) Perform daily health checks for the IAM solution and remediate accordingly privileges. Vulnerability Management (VM) Perform daily health checks for the VM solution and remediate accordingly vulnerabilities. Network Security Perform daily health checks for the network access control solution their enhancement. Data Protection Perform daily health checks for the data leakage prevention solution Identity and Access Management (IAM) Perform daily health checks for the IAM solution and remediate accordingly