Establishing and enforce IT security policies and practices to protect data and systems Ensuring compliance
recommendations and discuss best programming practices. Work with stakeholders to achieve appropriate
Cycle of all assets, through sound maintenance practices backed by solid procurement and planning activities
Cycle of all assets, through sound maintenance practices backed by solid procurement and planning activities