Identifying variations and potential high risk areas in securing adherence to standards and procedures Recommending Internet, email, databases, operating systems and security systems Testing, identifying and diagnosing functionality
network devices in response to newly identified security threats. Assists with software and hardware upgrades datacentres. Actively participates in various network security-related activities. Provides end-user support administration Microsoft Defender / Bitdefender / Mimecast security administration Microsoft Active Directory administration
bottlenecks for efficient data retrieval. Implement security measures to protect sensitive BI data. Define Implement security measures in PHP applications to prevent vulnerabilities. Address common security issues
Musharaka – Sharepoint Log) Diary updates Files Cash Security Guarantees General Admin Duties/Other QUALIFICATIONS
payments to vendors. Liaising with suppliers to secure favourable payment terms and address any billing
and kept to a minimum Vehicle, driver and cargo security Optimal usage of fuel No unnecessary route deviation
dissemination of information. Ensure that the security of the information systems is paramount in the lifecycle in adherence to all corporate cyber security standards. EDUCATION, EXPERIENCE & TRAINING:
development, with a track record of sourcing and securing suitable sites for Fashion stores. This individual with property owners, developers, and landlords to secure favourable terms for. Portfolio Management: Manage
development, with a track record of sourcing and securing suitable sites for Fashion stores. This individual with property owners, developers, and landlords to secure favourable terms for. Portfolio Management: Manage
Technical Knowledge Advanced database management and security best practices Advanced automation deployments network infrastructure Database Management Computer Security Disaster Recovery & Business continuity standards