capacity planning. Monitoring and administering access to the computers systems, servers and network of implementation of cybersecurity controls (including policies, procedures and technical controls). Maintaining comprehensive
and other vendor switches, routers, wireless controllers, and VPN • Supporting customers by developing including: routers, switches, wireless access points, controllers, WAN optimizers and monitoring applications
/>objective implementations, ensuring tight budgetary control.
Manage project and operational expenditure
expenditure for specialist area through
control of invoices through signoff procedures.
Manage compliance
financial services
sector.
5. Controls and Mitigations
Assist in creation
creation of true and accurate system change controls requests
for execution by the respective ICT team
/>implementation validation.
Perform user system access reviews, liaise with business units for
approvals
Establishing the needs of users and monitoring user access and security Monitoring performance and managing back-end organisation of data and front-end accessibility for end-users Refining the logical design so definitions for the data dictionary (metadata) Controlling access permissions and privileges Developing, managing
Monthly audit reports. Document Management and Control Co-ordinate the accuracy of the policies and procedures central library for staff reference. Administer access to the central Library and ensure no unlawful copying cyber theft and/or access to obsolete documentation. IQSMS audit report. System user access audit report.
Oversee day-to-day security operations, including access control, surveillance, and alarm systems. Coordinate and implement security measures, including access controls, perimeter security, and video surveillance
Oversee day-to-day security operations, including access control, surveillance, and alarm systems. Coordinate and implement security measures, including access controls, perimeter security, and video surveillance
Oversee day-to-day security operations, including access control, surveillance, and alarm systems. Coordinate and implement security measures, including access controls, perimeter security, and video surveillance
Monitor security systems, including CCTV, access control, and alarm systems, to identify and respond technologies, including physical security, access control, and surveillance systems. Excellent leadership
Monitor security systems, including CCTV, access control, and alarm systems, to identify and respond technologies, including physical security, access control, and surveillance systems. Excellent leadership