support that may include travelling • Network and Security support • Build, configure and repair computer YEARS OR MORE INDUSTRY EXPERIENCE • NETWORK AND SECURITY INFRASTRUCTURE KNOWLEDGE– CISCO, HP, UNIFI, FORTINET QUALIFICATIONS IN A, N / CCNA, MCSA, CCNA CYBEROPS / SECURITY / CYSA (OR OTHER RELEVANT QUALIFICATION) • TECHNICAL
certification, and skills in back and recovery, security tools, and Active Directory. Strong communication designing Azure solutions, managing services, ensuring security, collaborating with teams, and staying updated execution, and Azure services deployment; Implement security best practices and compliance standards; Monitor
experience in Kubernetes architecture, Networking, Security, Deployment, and Management 3 years Infrastructure technologies experience like SOAP and REST 3 years Web Security protocols experience like OAuth, JWT, OIDC Qualifications: Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS) AWS Associate level certifications
developers. Enrolling users and maintaining system security. Controlling and monitoring user access to the and implementations. Implement advanced database security features. Audit user activity to ensure integrity
manage cloud infrastructure on Cloud, ensuring security and compliance. Develop and execute comprehensive understanding of cloud computing concepts, services, and security protocols.
upgrades, perform regular backups, and ensure data security. A confident individual with excellent IT Acumen Knowledge of network protocols, TCP/IP, and network security Proficiency in operating systems such as Windows
teams in order to find the best balance between security, operation stability and compliance for the onboarding writing Minimum of 3-5 years of experience in IT security, system administration, or related fields. Demonstrated (CyberArk, BeyondTrust, or Thycotic) Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific on the latest developments in PAM technologies, security trends, and best practices through self-study
Microsoft products, Server and Storage hardware, Security, and on-site computer rooms.
offshore DevOps Provider to deliver a stable and secure solution. Working in big company environments with & Azure cloud area Further development of security and compliance documentation of the endpoint cloud Group Infrastructure Architecture, Cyber Security, Endpoint Security and other IT stakeholder to assess requirements
Microsoft products, Server and Storage hardware, Security, and on-site computer rooms. Manage risks related areas for improvement. Security Planning: Developing and implementing security measures to protect servers unauthorized access, data breaches, and other security threats. Disaster Recovery Planning: Creating