transformations. • Designing and implementing security measures to protect data from unauthorized access
efficiency during peak periods of usage; consider security at its highest level (third party attacks; data
has an understanding of all relevant backup and security procedures. Undertakes routine analysis and works
has an understanding of all relevant backup and security procedures. Undertakes routine analysis and works
external providers, vendors and end-users. Treat security as a first-class citizen Work closely with stakeholders
interrelationships of services including Systems, Security policy and Core ICT protocols to provide guidance
systems and software continuously. Conducting security checks and audits on the product. Ensuring the
(Microsoft Azure, Amazon Web Services) Experience in securing Cloud based applications and connectivity Experience
ensure their code adheres to standard, pose no security risks and is efficient and easy to understand