shared services, ensure Cyber and Information Security resilience, and act as technology governance and
meetings · Coordinate external contractors · Manage security vulnerabilities WHAT DO WE OFFER YOU? · Cutting
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders
and error correction, processing rules, access, security, audit controls, recovery routines and contingency
and error correction, processing rules, access, security, audit controls, recovery routines and contingency
systems and software continuously. Conducting security checks and audits on the product. Ensuring the
administration
Coordinate external contractors
· Manage security vulnerabilities
WHAT DO WE OFFER
external providers, vendors and end-users. Treat security as a first-class citizen Work closely with stakeholders
Network Technology VLAN, VPN's, Firewalls, Cyber Security, and IP routing protocols. Excellent understanding