Sharepoint and Security is essential THIS IS A HYBRID POSITION, BUT OUR CLIENT EXPECT ALL EMPLOYEES TO
shared services, ensure Cyber and Information Security resilience, and act as technology governance and monitoring, release and configuration management and all other relevant disciplines. Documentation of the and use proper rules to ensure it is a clean and secure implementation. What will make you successful in manage cluster integrations support applications security - cluster & applications Qualification and installations and upgrades Business requirements Security management and data recovery Change control
software development experience Min 4 years of Angular experience Min 4 years of Spring Boot experience Should
solution set Integrate SAP S/4 Hana Solutions Bachelor's Degree or equivalent S/4 Hana Certification Architecture
and governance on the integration platform for security, scalability, reusability, and quality; Interpret Bachelor's Degree in Computer Science or related field; 4 years' experience with integration development and
Xcede We have a current opportunity for a Security Compliance Analyst on a permanent basis. The position
Management – Manage Data, VoIP, and CCTV IP network. Keep all IP devices up to date with latest firmware release EIGRP, OSPF and BGP. Ensure maximum up-time. IT Security Management – Develop emergency, recovery, and data backup. Ensure URL filtering is enabled for all users. Endpoint Management and Managed AV. Ensure drive encryption. Ensure server room security. Compile yearly security report. Provide Pre- and Post-Sale Understand need and requirement of the customer, clarify all his/her questions enabling them to take an informed
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The and applications. Working knowledge of Web site security measures, such as firewalls and message encryption; performance requirements and interfaces; Engage with all internal and external stakeholders on project status such as reporting formats required, costs, or security needs to determine hardware configuration; Understand inquiries; and Monitor security system performance logs to identify problems and notify security specialists if
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The and applications. Working knowledge of Web site security measures, such as firewalls and message encryption; performance requirements and interfaces; Engage with all internal and external stakeholders on project status such as reporting formats required, costs, or security needs to determine hardware configuration; Understand inquiries; and Monitor security system performance logs to identify problems and notify security specialists if
delivery. Adhere to best practices when it comes to security (secret keys / tokens), Design, Build, and Maintain System Performance, Security, and Scalability: Enhance system performance, security, and scalability through frameworks. REST APIs that meets performance and security standards.