at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
firewalls, networks, Microsoft 365, Azure, and email security. Key Responsibilities: - Provide leadership and proposals and generate detailed reports. - Ensure the security and efficiency of our IT infrastructure. - Server Microsoft 365 and Azure. - Knowledge of email security best practices. - Certifications on the above
firewalls, networks, Microsoft 365, Azure, and email security. Key Responsibilities: - Provide leadership and proposals and generate detailed reports. - Ensure the security and efficiency of our IT infrastructure. - Server Microsoft 365 and Azure. - Knowledge of email security best practices. - Certifications on the above
tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy presentation Technical experience in the information security domain would be beneficial. Qualifications 3yr either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial
newer) and how to work with Team Foundation Server Securely access and use SQL Server 2016 (or newer) ITSM Microsoft Visual Studio Team Foundation Server Securely access and use SQL Server 2016 (or newer) ITSM having End-to-end idea of IT Security certifications (SOC, ISO) Security operational controls ABOUT US newer) and how to work with Team Foundation Server Securely access and use SQL Server 2016 (or newer) ITSM Microsoft Visual Studio Team Foundation Server Securely access and use SQL Server 2016 (or newer) ITSM
production systems. Ensuring availability, performance, security and scalability of AWS production systems. Managing of critical system security by leveraging best practices and prolific cloud security solutions. Providing architecture and process improvements. Implementation of security protocols by evaluating business strategies and
Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices meet the organization's requirements in terms of security, performance, scalability, and cost-effectiveness background in areas such as networking, databases, and security, as well as experience with cloud platforms and
providing secure cloud transformation by combining Microsoft cloud technology with cyber security, and managed ensure, stability, availability, performance and security of services Maintaining documentation quality and assess their effectiveness Oversee and test security measures, such as access authentication and disaster Familiarity with access control models and network security. Knowledge of Cisco, Juniper and Fortigate network
providing secure cloud transformation by combining Microsoft cloud technology with cyber security, and managed ensure, stability, availability, performance and security of services Maintaining documentation quality and assess their effectiveness Oversee and test security measures, such as access authentication and disaster Familiarity with access control models and network security. Knowledge of Cisco, Juniper and Fortigate network
maintaining networks and servers Implementing security protocols and procedures to prevent potential resolve support issues Deploying and enforcing security policies and procedures Keeping up to date with best practices in IT administration and system security Qualifications: Related Bachelor's Degree: computer