payments, procurement, service management, data security related processes and IT support services. 1. includes user account management, access control, and security configuration. 3. Network Operations: Managing optimization, and security compliance. 4. Security Operations: Implementing and maintaining security measures intrusion detection systems, and conducting regular security audits and assessments. 5. Incident Response:
Location : Kenilworth, Cape Town Work model: In office Salary : Negotiable based on experience Benefits SSDT Have experience defining database server security, user creation, roles and permissions. This role
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
across trading offices, including requirement gathering, documentation, and user security configuration Power BI, and SQL. Enforce Change Management and Security protocols, ensuring compliance with Sarbanes-Oxley
like our tech wizards use NSGs, VNETs, and VPNs to secure S.H.I.E.L.D. digital territory
A seasoned
/>Knowledge of access control models and network security, our digital fortress depends on it
Familiarity
business goals to ensure that solutions are scalable, secure, and compliant with industry standards. Additionally ong understanding of network architecture and security protocols
concepts. Troubleshooting Skills ( Network and Security ) Technical experience: BizTalk 2013, 2016 SQL Branching Strategy GIT and TFVS IBM MQ BizTalk Security Best Practices C# ( BizTalk Custom Behavior Extensions
switches
Strong understanding of network security principles and practices
Excellent problem-solving
Enjoy a hybrid work schedule, with 3 days in the office, fostering both collaboration and work-life balance