workers on the business's IT systems which includes access systems, time and attendance as well as CCTV Assist up to appropriate media Ensure security through access controls, backups, and firewalls Degree in Computer
SKILLS REQUIREMENTS: · Identity and Access Management · Privileged Access Management (CyberArk) · IT Operations onboarding of upcoming technologies into Privileged Access Management. · Working with the Privileged Account extend your knowledge in the Field of Identity and Access Management and Privileged Account Management. ·
installation commissioning of CCTV and
installation commissioning of CCTV and
certification in the installation commissioning of CCTV and Access control solutions - (Impro, Gallagher, Milestone red and methodical with fault finding.
Network and Internet access. Managing Access Control systems including: Access Control System management/maintenance management/maintenance, Access Control System enrolments, Alarm System Administrator. Coordination with response
laptops, printers, data projectors, VC equipment, access control (alarm & biometrics), handheld devices laptops, printers, data projectors, VC equipment, access control (alarm & biometrics), handheld devices Add and set up new users on all relevant system. Access the Help Desk to record, accept or resolve all threats. This includes antivirus software management, access control, and data backup procedures. Takes cognisance
REQUIREMENTS:
· Identity and Access Management
· Privileged Access Management (CyberArk)
·
onboarding of upcoming technologies into Privileged Access Management.
· Working with the Privileged
extend your knowledge in the Field of Identity and Access Management and Privileged Account Management.
laptops, printers, data projectors, VC equipment, access control (alarm & biometrics), handheld devices laptops, printers, data projectors, VC equipment, access control (alarm & biometrics), handheld devices Add and set up new users on all relevant system. Access the Help Desk to record, accept or resolve all threats. This includes antivirus software management, access control, and data backup procedures. Takes cognisance
, and ensuring data integrity and accessibility.
Academic Education: