excellent computer proficiency (especially in MS Office Excel), report and proposal writing skills, business thinker with strong competencies in examining information, documenting facts, providing insights, making possibilities, convincing people, articulating information, directing people, conveying self-confidence
Development and Training, together with management of information and IT systems Risk Management and the PR/Marketing effective communication mechanisms to ensure that information is effectively disseminated throughout the organization disruption to critical business activities. Information, Communications and Technology Ensure the development development and management of an effective internal Information and technology strategy. Monitoring the usage best practice guidelines. Corporate Governance, Information Management, Legal and Regulatory Compliance Develop
practices. A Bachelor's degree in Computer Science, Information Security 5 years experience in a similar application proficiency in C#, Java, and Python Relevant information security certifications include CEH, OSCP, OSCE others. Knowledge and experience in international information security standards and personal data protection are preferred. Knowledge and experience with information security standards and frameworks, such as OAuth
they do. We’re a small company with a relatively informal and relaxed environment where you won’t be just Integrate PCBs with and programming software/information systems. Do remote debugging/problem-solving technicians in the field. Maintain and manage information systems, servers, and databases from time to to time. Troubleshoot and user support information systems from time to time. An Important Announcement
Other information applicable to the opportunity:
certifications Intermediate proficiency in Microsoft Office Suite. 5 years of work experience in a technology
(essential): • Microsoft Windows 7, 8, 10 • Microsoft Office 2010 - 2016, 365 • Mac OS • Remote Desktop Support
/>
various sources including company data, public information, and purchased sources.
vulnerabilities