access in the townships, dominate this segment and control the township connectivity ecosystem. You will be
telecommunications specialist, is looking for a Field Team Controller to join their team in Midrand. This role is responsible
authorization, authentication, monitoring, access controls, attestation, and direct access to data. Change testing changes, separate environments, version control, and change meetings. IT Frameworks: Ensure compliance v8: Implement and manage CIS v8 controls covering inventory and control of assets, software assets, data secure configuration, account management, access control, vulnerability management, audit log management response management, and penetration testing. Audit Controls: Enforce information security policies, organization
Operations (IT.03 Monitor and Operate IT Product) Controls the overall release and change management of the the applications in the area of responsibility. Controls the implementation of technical lifecycle management security measures for the assigned applications. Controls the measures to improve operational quality for Operate IT Technology" and "Manage IT Governance". Controls the measurement and communication of the operation
internationally. Key Responsibilities: Examine internal IT controls, evaluate the design and operational effectiveness application controls. Provide recommendations and guidance on identified security and control risks. Develop
and other vendor switches, routers, wireless controllers, and VPN • Supporting customers by developing including: routers, switches, wireless access points, controllers, WAN optimizers and monitoring applications in
Development:
Latest Final Signed off Change Control Policy (not a draft version).
List of changes
Program Library.
Evidence of Automated version control.
Evidence of migration software.
Emergency
rotation and disposal policies.
Environmental controls similar to server room above.
Password Policy
changes.
Separate environments.
Version control.
Change meetings and forum.
IT
years’ experience in cyber governance, risk, controls and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam being monitored and managed.
Proactive Control design and implementation guidance provided to the Business. Process and Control Compliance To provide Management with assurance covering controls across the Business environments that there are 8 years' experience in cyber governance, risk, controls, and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam
years’ experience in cyber governance, risk, controls, and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam being monitored and managed