vandenbergmediro-ict.co.za Logical Access Review Process (Extract Preparation, Quarterly logical access review, Semi-Annual Semi-Annual logical access reviews, Annual Access Profile content reviews) Logical Access Review and Validation Validation of various application accesses Monthly Change Management review Assistance with Sarbanes-Oxley
Delphi an advantage. Database modifications using Access/ PostgreSQL. Design, development and integration
/ C# an advantage. Database modifications using Access / PostgrSQL. Design, development and integration
Analyst to join their dynamic team. You will manage access to domain resources and business systems. This Application environments. Perform password resets and access revocations. Implement and maintain security roles the user account lifecycle. Develop and update access control lists. Process security authorization requests maintain access to securable network resources (share folders, network drives, Internet access). Document Disaster Recovery Planning activities to ensure access to Business services in the event of a major outage
for the control of internal IT assets, Biometric access system control , The applicant must show case the policies related to data privacy, security, and access Managing relationships with IT vendors, including
Company based in Rosebank is looking for a Time & Access Specialist, on a hybrid basis. Must be willing specialists concerning Time and Attendance for all Access control Infrastructure. Manage all risks relating & Attendance management systems, including access control systems and hardware. Integration Planning:
equipment, implement, and make required changes to the access and core fibre routes on the metro and backbone improve company targets. Plan and design of new access, metro and core duct and fiber routes, spurs, and
issues. Identify risk areas related to user system access. EWM error queue analysis & resolution EWM
tools and services that enable affordable internet access to Ekasi (Ekasi is a township slang meaning 'my the financial barrier to true unlimited internet access for those in the townships of South Africa, while which we serve, by equipping them with the accessibility required for their personal and professional
accordance with industry best practices, such as access control lists, encryption, and two-factor authentication management and configuration, identify management and access control, firewall management, auditing and monitoring administrator account management, SSO, conditional access controls and password/key management. Documenting solutions in the following areas: Identity and access Platform protection Security operations Data security Analyst Associate Microsoft Certified: Identity and Access Administrator Associate Microsoft Certified: Information