Introduction The Wits Reproductive Health and HIV Institute (Wits RHI) is a renowned African-led research institute that seeks solutions to Africa's health challenges. It is located within the University of the Witwatersrand and addresses some of the greatest public health concerns affecting our reg
specializes in the manufacturing and supply of access control equipment
Job DescriptionYour responsibilities QualificationSkills
Introduction The Wits Reproductive Health and HIV Institute (Wits RHI) is a renowned African-led research institute that seeks solutions to Africa's health challenges. It is located within the University of the Witwatersrand and addresses some of the greatest public health concerns affecting our reg
storage of data, full suite of Microsoft access
vandenbergmediro-ict.co.za Logical Access Review Process (Extract Preparation, Quarterly logical access review, Semi-Annual Semi-Annual logical access reviews, Annual Access Profile content reviews) Logical Access Review and Validation Validation of various application accesses Monthly Change Management review Assistance with Sarbanes-Oxley
Requirements: Candidate must have strong I.T. knowledge in Access Management, Change Management, IT Operations, IT satisfactory Alice score. Duties and Responsibilities: Access to Programs & Data: Implement and maintain authentication, monitoring, access controls, attestation, and direct access to data. Change Management: protection, secure configuration, account management, access control, vulnerability management, audit log management security, human resource security, asset management, access control, cryptography, physical and environmental
solution analyst. The primary objective is to unpack, access, and document an existing application within the scope, identifying issues and gaps, documenting access and security protocols, completing application Issues & Gaps
solution analyst. The primary objective is to unpack, access, and document an existing application within the scope, identifying issues and gaps, documenting access and security protocols, completing application Issues & Gaps
generator and access control systems. Activate emergency procedures in case of emergency. Monitor access control control (programming, issuing, enabling, disabling of access disks). Control all security registers. Investigate threat and risk assessment (TRA) Implement effective access control measures. Develop post orders for security
generator and access control systems. Activate emergency procedures in case of emergency. Monitor access control control (programming, issuing, enabling, disabling of access disks). Control all security registers. Investigate threat and risk assessment (TRA) Implement effective access control measures. Develop post orders for security