Storage hardware, Security, and on-site computer rooms.
Responsibilities Analyze information to identify security control and/or capability gaps that impacts the organization's remediation of vulnerabilities Enhance the current controls and oversight of the various compute environments Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that
Responsibilities Analyze information to identify security control and/or capability gaps that impacts the organization's remediation of vulnerabilities Enhance the current controls and oversight of the various compute environments Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that
project methodology MVNO (Mobile Virtual Network Operator) – requires strong / technical telco experience) Planning Management Quality Management Change Control Management RAID Management (Risks, Assumptions
CON001701-Kyle-1 To manage and oversee the Bank's operational and tactical development initiatives which include correction, processing rules, access, security, audit controls, recovery routines and contingency procedures end system and program tests to verify correct operation of completed systems. ∙ Ensure adherence to release technical aspects of application development, controls, and documentation standards as well as on engaging
CON001701-Kyle-1 To manage and oversee the Bank's operational and tactical development initiatives which include correction, processing rules, access, security, audit controls, recovery routines and contingency procedures end system and program tests to verify correct operation of completed systems. ∙ Ensure adherence to release technical aspects of application development, controls, and documentation standards as well as on engaging
Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that
5 years' experience in cyber governance, risk, controls and compliance management in a technology environment Proactive Control design and implementation guidance provided to the Business. Process and Control Compliance
5 years' experience in cyber governance, risk, controls and compliance management in a technology environment Proactive Control design and implementation guidance provided to the Business. Process and Control Compliance