updates to ensure optimal system performance and security. -Customer Communication: Serve as a primary contact Directory and Sharepoint experience.Knowledge of Cyber Security will be beneficial.Proven experience in IT support
requirement gathering, documentation, and user security configuration. Design and generate insightful Power BI, and SQL. Enforce Change Management and Security protocols, ensuring compliance with Sarbanes-Oxley
across the organisation. Ensure adherence to data security and privacy regulations. Share data architecture Understanding of data governance, quality, and security regulations. Job ID: J104476 PS Even if you feel
and implement API integrations with a focus on security (Basic Auth, OAuth2). Implement solutions in a (version 10). Experience with API integration and API security protocols (Basic Auth, OAuth2). Familiarity with
efficiency and productivity. Security and Compliance: Implement robust security measures to protect sensitive
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The applications; o Design and implement Web site security measures, such as firewalls and message encryption; such as reporting formats required, costs, or security needs to determine hardware configuration; o Determine and o Monitor security system performance logs to identify problems and notify security specialists if
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The applications; o Design and implement Web site security measures, such as firewalls and message encryption; such as reporting formats required, costs, or security needs to determine hardware configuration; o Determine and o Monitor security system performance logs to identify problems and notify security specialists if
regular system audits to ensure compliance with security protocols; Collaborate with IT team members to
regular system audits to ensure compliance with security protocols; Collaborate with IT team members to
elements. Understanding and implementation of security and data protection. Analysing documentation and