Introduction The Wits Reproductive Health and HIV Institute (Wits RHI) is a renowned African-led research institute that seeks solutions to Africa's health challenges. It is located within the University of the Witwatersrand and addresses some of the greatest public health concerns affecting our reg
specializes in the manufacturing and supply of access control equipment
Job DescriptionYour responsibilities QualificationSkills
Introduction The Wits Reproductive Health and HIV Institute (Wits RHI) is a renowned African-led research institute that seeks solutions to Africa's health challenges. It is located within the University of the Witwatersrand and addresses some of the greatest public health concerns affecting our reg
storage of data, full suite of Microsoft access
vandenbergmediro-ict.co.za Logical Access Review Process (Extract Preparation, Quarterly logical access review, Semi-Annual Semi-Annual logical access reviews, Annual Access Profile content reviews) Logical Access Review and Validation Validation of various application accesses Monthly Change Management review Assistance with Sarbanes-Oxley
solution analyst. The primary objective is to unpack, access, and document an existing application within the scope, identifying issues and gaps, documenting access and security protocols, completing application Issues & Gaps
solution analyst. The primary objective is to unpack, access, and document an existing application within the scope, identifying issues and gaps, documenting access and security protocols, completing application Issues & Gaps
Delphi an advantage. Database modifications using Access/ PostgreSQL. Design, development and integration
/ C# an advantage. Database modifications using Access / PostgrSQL. Design, development and integration
Analyst to join their dynamic team. You will manage access to domain resources and business systems. This Application environments. Perform password resets and access revocations. Implement and maintain security roles the user account lifecycle. Develop and update access control lists. Process security authorization requests maintain access to securable network resources (share folders, network drives, Internet access). Document Disaster Recovery Planning activities to ensure access to Business services in the event of a major outage