software), pertaining to Fire Detection and/or Access control and Technical security systems and/or Building
Unlock Your Career Potential: Join Us as an Access Management Consultant and Be the Key to Seamless Security Skills and Knowledge : Understanding of identity and access management IAM concepts, including authentication Skills and Knowledge : Understanding of identity and access management IAM concepts, including authentication
We are looking for a Network Engineer with data center/Acess experience availailable immediately for a 3 months contract Minimum 5 years’ experience work on Data Center and Office LAN management .Minimum CCNPAdvanced knowledge of Cisco routers and switches, Wireless technology, VPN technologies an
Unlock Your Career Potential: Join Us as an Access Management Consultant and Be the Key to Seamless Security Skills and Knowledge : Understanding of identity and access management IAM concepts, including authentication
Reference: PTA001404-MF-1 Access Control Technician We are recruiting for an Access Control Technician to technical guidance and suggestions for enhancing access control systems, including readers and turnstiles
technical guidance and suggestions for enhancing access control systems, including readers and turnstiles
external client is looking for a Specialist Time and Access for one of their clients based in Johannesburg depending client requirements. The Specialist Time and Access must have experience in monitoring the work and Time and Attendance management systems, including access control systems and hardware. Key outputs: - Monitor specialists concerning Time and Attendance for all to Access control Infrastructure. - Manage all risks relating Time and Attendance management systems, including access control systems and hardware. - Integration Planning:
services industry is looking to hire an Identity Access Management (IAM) Specialist to be based at their the NetIQ based Access and Review software that Sanlam uses to implement role-based access for business provisioning, de-provisioning, account monitoring, access reviews and authentication support. The analysis implementation of the technical requirements of identity and access management (IAM) projects, including automated harvesting, role based provisioning (RBAC) NetIQ Access Review Python and Powershell development skills
storage of data, full suite of Microsoft access
storage of data, full suite of Microsoft access