oversee and coordinate all mining security related activities including security resources and budgets.
Strong admin skills.
SOP
Must follow full security protocol for the mining industry.
Gun protocol
protocol.
300 + guards
Maintain statutory security protocol
Must be able to provide internal
the mine security operations management team through proactive engagement.
Prepare security operational
Services Manager role is a chance to orchestrate a secure and stable infrastructure capacity by managing Support Staff, Service Desk operations, Cyber Security Operations, 3rd party vendors, service providers Recovery
Backup Disaster Recovery and Security Management:
infrastructure as code
· Experience with security best practices for cloud infrastructure
·
Management: Grafana Loki and Tempo.
· Cloud Security Posture Management and wiz.io usage
· FinOps
and Azure Service Bus
· A firm grasp of security best practices for cloud infrastructure
·
code using Terraform
· Implement and manage security controls for our cloud infrastructure
· Monitor
infrastructure up to date and secure, performing updates and security patches. (i.e. Kubernetes , ingress
implementation, maintenance, performance, integrity, and security of several Oracle databases. Duties will include configuration, implementation and enforcement of database security and investigating and solving database and production will also be expected to establish the database security procedures and enforce their application, advise
maintain Ansible playbooks and roles in a highly secure environment
motivated Electrical Engineer with PREng, eager to secure a role with a renowned firm specialising in Engineering
promptly to the client and following up proactively to secure the business for the company.
/>· Troubleshooting and maintenance
· IT Security
· System Monitoring
· Incident and Request
solutions, the solution architects as well as the IT security environment.
Dev/Ops-Engineer Platform IDPs
relevant documentation in the Product Depot (e.g. security documentation, functional documentation, operations
storage, retrieval, and performance. Implement security measures to protect sensitive data.
Data