delivering cutting-edge hardware and software-based security solutions in the ICT industry, is looking for They pride themselves on developing secure networking encryptors, secure mobile communications, and cryptographic Develop and maintain software applications for secure networking encryptors, mobile communications, and trusted operating system, ensuring its integrity and security. Collaborate with a diverse team to design custom Strong understanding of networking and network security. Systematic and analytical approach to problem-solving
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
of Linux and Unix systems to ensure top-notch security and optimal performance. Take the lead in setting promptly applying security patches and conducting daily system checks. Empower users with secure access through meticulous management of user permissions and regular security audits. Be the go-to expert for software installation Experience with server monitoring tools Knowledge of security patch management and system monitoring. Ability Ability to manage user permissions, perform security audits, and configure file sharing. Job ID: J104517 PS
task efficiency. KEY PERFORMNACE AREAS : Ensuring security updates are current across all systems. Running ensure the most secure approach is being employed. Developing systems for specialized security requirements responsive. Studying devices and implementing the best security protocols for everything from cell phones to tablets departments to ensure adherence to security protocols. Monitoring security administrations to ensure best
Design and maintain secure and reliable network architectures. Firewall and security planning and implementation
(CompTIA A, etc.) Excellent knowledge of internet security and data privacy principles Proven experience installations and ensure systems are up-to-date and secure Provide technical support to users and train non-technical successfully backed up to appropriate media. Ensure security through access controls, backups, and firewalls
Server 2019 / 2022 advantageous A, Server, N, Security Additional certifications advantageous Min 4 escalations Policies and procedures Raise any security awareness. Advanced hardware installations and Server 2019 / 2022 advantageous A, Server, N, Security Additional certifications advantageous Min 4