regular system backups, maintenance runs, and security updates, fortifying our cyber barriers. • Command device configuration, performance optimisation, security enforcement, and management of cabling systems being an added advantage. • History of managing security solutions like firewalls, antivirus, and intrusion
dissemination of information. ➢ Ensure that the security of the information systems is paramount in the lifecycle in adherence to all corporate cyber security standards. Lead and manage the application development
databases for optimal performance. Ensure data security, scalability, and data integrity within all processes
regulations and best practices Develop and enforce data security protocols Computer Science / Data Science / related
and best practices. - Develop and enforce data security protocols. Bachelor's degree in computer science
permissions. Responsible for implementation of IT security process and procedures; and ensure adherence of
practices for data governance, data quality, and data security. Stay updated on industry trends and emerging
provide assistance / feedback to customers. Load security blocks where suspicious transactions / activity
provide assistance / feedback to customers. Load security blocks where suspicious transactions / activity
applications. Ensure that data engineering solutions are secure, compliant, and meet data governance requirements