upgrades, perform regular backups, and ensure data security. A confident individual with excellent IT Acumen Knowledge of network protocols, TCP/IP, and network security Proficiency in operating systems such as Windows
teams in order to find the best balance between security, operation stability and compliance for the onboarding writing Minimum of 3-5 years of experience in IT security, system administration, or related fields. Demonstrated (CyberArk, BeyondTrust, or Thycotic) Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific on the latest developments in PAM technologies, security trends, and best practices through self-study
Microsoft products, Server and Storage hardware, Security, and on-site computer rooms.
stakeholders, and upholding confidentiality and security measures when handling sensitive materials The
keeping all systems up to date with patches and security fixes, and helping end-users do their job more long-term fault, configuration, performance and security management of Desktops systems Install, configure Server Administration - Active Directory, Data Security, Group Policies etc. - Installation and troubleshooting
identification of Occupational Health, Safety and Security improvements based on the strategic objectives and implementing Occupational Health, Safety and Security policies and procedures to maintain an effective activities on a regular basis. Managing and oversee security management of Projects Overseeing the permit to
experience in Kubernetes architecture, Networking, Security, Deployment, and Management.
identification of Occupational Health, Safety and Security improvements based on the strategic objectives and implementing Occupational Health, Safety and Security policies and procedures to maintain an effective activities on a regular basis. Managing and oversee security management of Projects Overseeing the permit to
exposure within the networking, voice and perimeter security infrastructure.
advanced best practices for cloud architecture, security, and cost optimization. Automation: Lead the development workflows. Security and Compliance Leadership: Establish and enforce comprehensive security measures and Lead the organization's efforts in maintaining a secure and compliant technology environment. Collaboration various teams (cross-functional, software, platform, security, data, architecture and DevSecOps) to ensure successful