Order forms, templates, application homepage,Management of submission blockers, invoice tolerances, security fields Participate in resolving Coupa system integration elements Execution of system changes including business user support on system administration and integration related matters, ensuring that resolution meets Excellent relationship and networking skills Ability to manage own workload and timelines Customer centric with to account on agreed upon performance targets Manages Complexity - interprets and simplifies complex
Values - Shows a commitment to ethical conduct, integrity and a strong sense of responsibility. Adhering Organising - Uses a structured approach to effectively manage tasks. Presenting & Communication - Articulates talent acquisition, on-boarding, performance management, development, career progression, employee relations Values - Shows a commitment to ethical conduct, integrity and a strong sense of responsibility. Adhering Organising - Uses a structured approach to effectively manage tasks. Presenting & Communication - Articulates
Values - Shows a commitment to ethical conduct, integrity and a strong sense of responsibility. Adhering Organising - Uses a structured approach to effectively manage tasks. Presenting & Communication - Articulates talent acquisition, on-boarding, performance management, development, career progression, employee relations Values - Shows a commitment to ethical conduct, integrity and a strong sense of responsibility. Adhering Organising - Uses a structured approach to effectively manage tasks. Presenting & Communication - Articulates
DESCRIPTION Key Responsibilities Identity and Access Management (IAM) Perform daily health checks for the IAM IAM solution and remediate accordingly. Manage user lifecycles (creation, modification, deletion) and ensure remove unnecessary privileges. Vulnerability Management (VM) Perform daily health checks for the VM solution evaluate vulnerability scans. Provide vulnerability management reports to key stakeholders including remediation Security, Microsoft Certifications, Vulnerability Management Must have 1-3 years' experience in a Cybersecurity
DESCRIPTION Key Responsibilities Identity and Access Management (IAM) Perform daily health checks for the IAM IAM solution and remediate accordingly. Manage user lifecycles (creation, modification, deletion) and ensure remove unnecessary privileges. Vulnerability Management (VM) Perform daily health checks for the VM solution evaluate vulnerability scans. Provide vulnerability management reports to key stakeholders including remediation Security, Microsoft Certifications, Vulnerability Management Must have 1-3 years' experience in a Cybersecurity
Key Responsibilities: Assist business teams and management with the development and implementation of operational Analysis Data control Document management Digital Library Management Presentation Creation 3 Behaviours: audits, trading and non-trading accounts, asset management and reporting. They work collaboratively to make Key Responsibilities: Assist business teams and management with the development and implementation of operational Analysis Data control Document management Digital Library Management Presentation Creation 3 Behaviours:
Key Responsibilities: Assist business teams and management with the development and implementation of operational Analysis Data control Document management Digital Library Management Presentation Creation 3 Behaviours: audits, trading and non-trading accounts, asset management and reporting. They work collaboratively to make Key Responsibilities: Assist business teams and management with the development and implementation of operational Analysis Data control Document management Digital Library Management Presentation Creation 3 Behaviours:
for the IAM solution and remediate accordingly. Manage user lifecycles (creation, modification, deletion) for the IAM solution and remediate accordingly. Manage user lifecycles (creation, modification, deletion)
for the IAM solution and remediate accordingly. Manage user lifecycles (creation, modification, deletion) for the IAM solution and remediate accordingly. Manage user lifecycles (creation, modification, deletion)