required:
Understanding of application security standards and developing secure applications Key Performance Areas
customer support. Ensure compliance with cyber security regulations and maintain customer cloud infrastructure abilities. Familiarity with Active Directory, security concepts, and scripting tools like PowerShell
maintaining the highest standards of integrity, security, and customer satisfaction. ORequirements Bachelor's to effectively manage operational disruptions, security breaches, and other incidents. Coordinate with
Improve functionality of existing systems Implement security and data protection solutions Assess and prioritize for ETL pipelines to enhance reusability. Develop secure and efficient data lakes and warehouses. Build
Database security knowledge. Knowledge about cloud technologies. Familiarity with security auditing frameworks
record. Daily tasks, printer support, firewall and security checking. Internet management, boardroom management devices Daily tasks, printer support, firewall and security checking. Internet management & boardroom
aligning with business requirements, scalability, and security. Evaluate and select fit-for-purpose network technologies for successful implementation. Integrate robust security measures into network designs to safeguard sensitive
research conducted via internet and other sources, secure meetings, do cold calling and obtain info about advertising media and information used to access client/secure deals Excellent product knowledge maintained Matric