telecommunications specialist, is looking for a Field Team Controller to join their team in Midrand. This role is responsible
Seeking a passionate, versatile Controller to oversee and run branding across all regions. In this role
threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing Implement and manage security technologies and controls, including firewalls, intrusion detection/prevention solutions. Design, implement, and maintain security controls and configurations within AWS environments Configure Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service (KMS), and AWS Config, and AWS CloudTrail); cloud security controls and compliance frameworks, such as AWS Well-Architected
and give training on a point-of-sale and a stock control system.
Responsibilities
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / timely resolution Design and implement security controls, configurations, and solutions to mitigate risks remediation actions Design and implement security controls and configurations within AWS environments Ensure Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service (KMS), and investigations in AWS environments Integrate security controls and practices into the software development lifecycle
SQL solutions for monitoring and automation of controls.
SQL solutions for monitoring and automation of controls. Development of exception reports and Power BI routines that maintain reporting and automated controls. Identify and build appropriate models/other solutions facilitate cross system reporting. Automation of controls in the business processes. Design and implement
determine whether the Groups systems of internal controls, risk management and governance, as designed and practices
user account lifecycle. Develop and update access control lists. Process security authorization requests security patches and ensuring that proper security controls are present on endpoint resources. Provision and per schedule. Compliance, Governance, Risk and Control Processes: Liaise with Change and Release Management advantageous. Sound knowledge of Information Security controls, concepts, and best practices is required along
IT-risk-based needs and restrictions into technical control requirements and specifications, as well as generate •Proactively monitor systems reports for access control violations/intrusion detection, cybersecurity concerns security risks and controls, as well as discover new risks and suitable controls. •Collaborate with the