and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
Confluence, Trello) Operations Management IT security best practices and risks Salary Market Related
automation. - Ensure compliance, data protection, IT security, and enforce uniform business process requirements
external providers, vendors and customers. Treats security as a first-class citizen. Works closely with stakeholders
solutions Update digital certificates and patch security vulnerabilities Uphold a high standard of cybersecurity
solutions Update digital certificates and patch security vulnerabilities Uphold a high standard of cybersecurity
team Develop systems solutions in line with IT Security standards and other compliance topics, quality
Development team schedule the required training. Security Management SHE Systems Coordinate the development
Development team schedule the required training. Security Management SHE Systems Coordinate the development