Description:
- Identity Access Management to the Group’s Active Directories and other application systems for new joiners, leavers and movers
- Carry out periodical reviews in line with the Group’s Access Control Policies including reporting to the relevant Corporate Area
- Maintain user access matrices and ensure compliance therewith
- Ensure compliance with security policies
- Assist in defining security related technical requirements necessary for compliance with regulation
- Providing second line support to End Users within the established IT Security Services framework
- Contributing in the upgrades of IT security platforms and new execution of IT security solutions
- Update documentation and procedures
- Collaborate in the response security events
- Conduct identity reviews on several core systems.
- Possess an MQF Level 4 or 5 in IT Computer Systems and Network, while a Degree (B.Sc. ) in Computer Studies or equivalent Certifications from ISACA are considered an asset.
- Ideally having a minimum of two years experience in Information Technology.
- Any experience on the management of Active Directories and User Access will also be preferred.
- General knowledge of industry practices, standards, and concepts within field of work and analytical business skills.
- Capable of decision making using broad management skills. Applies guidelines and procedures that leave considerable room for discretion and interpretation.
- Self-motivated work under general supervision. Work is reviewed for overall adequacy in meeting objectives.
- Develops solutions to a variety of problems, typically technical in nature, of moderate scope and complexity.
- Refers to and interprets policies and practices for guidance.
- Contacts other departments and or external organizations or parties frequently.
- Expertise in any of the following would be an added bonus: Access control systems and methodology; Identity management & authentication systems;Directory services design; Encryption technologies; Data and systems integrity controls; - Network and Internet Security; Audit and event management; Operational security controls; Secure coding practices/Code review; Vulnerability Analysis
- Demonstrated Technical Knowledge in: TCP/IP Communications, Networking, DNS; - Microsoft Windows—Server & Desktop; - Problem-solving; - Oracle or other SQL database; Demonstrated Communications and Business Skills
- Written and oral presentation skills
- Ability to manage and prioritize, changing workloads in a challenging technical environment
- Capacity to quickly absorb new concepts and technologies and apply that knowledge to current efforts and plans
- Demonstrated flexibility and capacity for creative thinking.