availability. Security: Implement best practices for infrastructure and application security, including Chef. Solid understanding of networking concepts, security principles, and best practices for cloud environments
efficient collaboration tools.
allocated audits are conducted Recruitment of New Security Officers / Risk Administrators – Interviews to (Travelling will be required) FF, FA, SHEQ etc. Conduct Security Trainings Schedules candidates / employees into allocated audits are conducted Recruitment of New Security Officers / Risk Administrators – Interviews to
Management, Health and Safety, as well as Site Security.
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience ESXi Disaster Recovery/Risk Management Firewall / Security Experience Knowledge of Contact Centre Technologies
shared services, ensure Cyber and Information Security resilience, and act as technology governance and and use proper rules to ensure it is a clean and secure implementation. What will make you successful in and software Financial advice and support System security Advanced analytics to address business requirements
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The and applications. Working knowledge of Web site security measures, such as firewalls and message encryption; such as reporting formats required, costs, or security needs to determine hardware configuration; Understand inquiries; and Monitor security system performance logs to identify problems and notify security specialists if
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The and applications. Working knowledge of Web site security measures, such as firewalls and message encryption; such as reporting formats required, costs, or security needs to determine hardware configuration; Understand inquiries; and Monitor security system performance logs to identify problems and notify security specialists if
advanced best practices for cloud architecture, security, and cost optimization.
advanced best practices for cloud architecture, security, and cost optimization. Automation: Lead the development workflows. Security and Compliance Leadership: Establish and enforce comprehensive security measures and Lead the organization's efforts in maintaining a secure and compliant technology environment. Collaboration various teams (cross-functional, software, platform, security, data, architecture and DevSecOps) to ensure successful