systems security hardening. - Strong grasp of SAP security concepts and proficiency with SAP security tools and investigate security breaches, and test for vulnerabilities. - Maintenance of security posture for enterprise timeliness, and accuracy. - Ensure systems comply with security standards. - Manage annual penetration testing required. - Perform security remediation. - Apply and analyze impact of SAP Security Notes released. - - Provide guidance to projects on SAP Security profile parameters and analysis. - Evaluate and remediate
responsible for identifying vulnerabilities and security risks in various IT systems, applications, and simulate cyber-attacks to test the effectiveness of security measures and to identify any weaknesses before Bachelor's degree in computer science, Information Security, or at least two years' experience. Relevant certifications certifications such as OSCP (Offensive Security Certified Professional), CEH (Certified Ethical Hacker) similar role in cybersecurity. Strong knowledge of security across various platforms including Linux, Windows
infrastructure, ensuring the highest levels of performance, security, and reliability. You will lead a team of skilled design, operational excellence, and information security systems and processes. Additionally, you will to stay abreast of current trends in network, security, and cloud infrastructure, and provide strategic design, operational excellence, and information security systems and processes.
infrastructure, ensuring the highest levels of performance, security, and reliability. You will lead a team of skilled design, operational excellence, and information security systems and processes. Additionally, you will to stay abreast of current trends in network, security, and cloud infrastructure, and provide strategic design, operational excellence, and information security systems and processes. Develop and implement strategies performance, security, and reliability. Stay informed about current trends in network, security, and cloud
join a highly motivated and energetic team of security specialists to provide Fortinet firewall support advantageous
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
Information Technology Operations, Engineering and/or IT Security function.
5 or more years of proven experience
overall IT operations environment, considering security, operational, and business requirements.
Conduct
vulnerability assessments to identify potential security risks and prioritize patching based on criticality
systems, and applications.
Collaborate with the security team to evaluate the risk associated with unpatched
coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
of user and risk impact. Use a wide spectrum of security and technical expertise to contribute to the modernisation IT-related functions 5 years in Design, experience in Security Domain required. TOGAF Certification, ITIL (Information (Information Technology Infrastructure Library) Security Domain-related certifications preferable. End-to-end Concepts and Architecture Systems Analysis and Design Security Concepts Cloud infrastructure and DevOps deployments Configuration Engineering Lead, IAM Solutions, Security, Cyber security, TOGAF, ITIL, Linux, Wintel, Java, Javascript
requested.
overall IT operations environment, considering security, operational, and business requirements. Implement overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure