and irregular activity
policies and procedures adhere to compliance and audit requirements
Maintain data and document version
access for business roles, role management and role audit. Develop and enhance security applications to ensure
IDS/IPS, Web-Proxy, Cloud Security and Security Audits. Top candidates will be comfortable working with
needs. Perform database transaction and security audits. Establish appropriate end-user database access
needs. Perform database transaction and security audits. Establish appropriate end-user database access
needs. Perform database transaction and security audits. Establish appropriate end-user database access needs. Perform database transaction and security audits. Establish appropriate end-user database access