payment-related technologies. Payment Security: Assess payment security risks and vulnerabilities, develop strategies, and ensure compliance with industry security standards such as PCI DSS and ISO 27001. Stakeholder
frameworks to ensure the integrity, quality, and security of banking data assets. Data Analysis: Conduct domain. Data Privacy and Security: Implement robust data privacy and security measures, including encryption
requirements for data quality, data lineage, data security, data privacy and other relevant aspects for business management improvements, set data quality, data security, data privacy, data issue remediation guidelines experience with data quality, data lineage, data security, data privacy, data lifecycle management, data
kept to a minimum
Vehicle, driver and cargo security
Optimal usage of fuel
No unnecessary
procedures (as per client requirements)
Safety and security standards
Optimal allocations of vehicles
report keeping system is maintained
Safety and security orientation
Implement and manage an effective
Certified Network Associate - Security (CCNA-SEC) - Check Point Certified Security Administrator (CCSA) - Check Check Point Certified Security Administrator NG with Application Intelligence (CCSA-NG AI) - VMware Certified and Routers - SonicWall Firewalls and SSL VPN Security Appliances - Cisco Firewalls and Routers - Cisco
data to the cloud, considering data integrity, security, and minimal downtime. Define a robust testing in the cloud environment. Conduct performance, security, and compatibility testing. Create detailed documentation tools offered by the cloud providers. Implement security best practices for the cloud environment. Ensure encryption, access controls, and compliance with security policies. Develop training materials for IT staff
as a software application tester working with: Security Penetration Testing. UX Testing Ul Testing Integration
Troubleshoot, debug and upgrade software Create security and data protection settings Build features and
manufacturing and supply of unique physical perimeter security barriers. We currently require the services of
Integration Architecture, Infrastructure Architecture, Security Architecture and/or Application Architecture.