There are still lots of open positions. Let's find the one that's right for you.
Coordinates the creation of user accounts, managing form authorizations, and other task required for the establishing appropriate job relevant access to company's IT resources. As critical is the deactivation or modification of user access for terminated or transferred workforce. Demonstrates a basic understanding and adheres to departmental processes for change control. Maintains a level of cybersecurity knowledge sufficient to securely accomplish their job duties.