certification, and skills in back and recovery, security tools, and Active Directory. Strong communication designing Azure solutions, managing services, ensuring security, collaborating with teams, and staying updated execution, and Azure services deployment; Implement security best practices and compliance standards; Monitor
including IT infrastructure, networking, and security Understanding of compliance and governance requirements requirements, such as data privacy, security, and auditing.
HTTP,BIND,LDAP System Security implementing Firewall Rules and IP tables Security-Enhanced Linux (SElinux)
including IT infrastructure, networking, and security Understanding of compliance and governance requirements requirements, such as data privacy, security, and auditing
manage cloud infrastructure on Cloud, ensuring security and compliance. Develop and execute comprehensive understanding of cloud computing concepts, services, and security protocols.
upgrades, perform regular backups, and ensure data security. A confident individual with excellent IT Acumen Knowledge of network protocols, TCP/IP, and network security Proficiency in operating systems such as Windows
teams in order to find the best balance between security, operation stability and compliance for the onboarding writing Minimum of 3-5 years of experience in IT security, system administration, or related fields. Demonstrated (CyberArk, BeyondTrust, or Thycotic) Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific on the latest developments in PAM technologies, security trends, and best practices through self-study
offshore DevOps Provider to deliver a stable and secure solution. Working in big company environments with & Azure cloud area Further development of security and compliance documentation of the endpoint cloud Group Infrastructure Architecture, Cyber Security, Endpoint Security and other IT stakeholder to assess requirements
Microsoft products, Server and Storage hardware, Security, and on-site computer rooms. Manage risks related areas for improvement. Security Planning: Developing and implementing security measures to protect servers unauthorized access, data breaches, and other security threats. Disaster Recovery Planning: Creating
strategies, ensuring seamless access, collaboration and security of business documents