meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
database-related issues. Ensure that all database systems are secure, reliable, and compliant with industry standards
tests, Integration tests and System Integration security tests. System Monitoring including Idocs Monitoring
database-related issues. Ensure that all database systems are secure, reliable, and compliant with industry standards
applications for performance, scalability, and security.
external providers, vendors and customers. Treats security as a first-class citizen. Works closely with stakeholders
Role Tasks/Requirements: Planning: Assist user departments in designing system requirement/proposal documentation maintenance requests. Provide support to all user departments in achieving the approved company technology
Role Tasks/Requirements Planning: Assist user departments in designing system requirement/proposal documentation maintenance requests Provide support to all user departments in achieving the approved company technology