/>
INFORMATION SECURITY SPECIALIST (12 MONTHS FIXED-TERM CONTRACT) The purpose of the job is to plan, manage manage, and administer the network security. Ensure all network components are managed in accordance with Information Security Specialist, you will be responsible to: Design, install and manage security mechanisms Upgrade systems by implementing and maintaining security controls; Protect the system by defining access Develop and implement standardised Information Security processes and procedures; Respond to internal
systems, and other security appliances for network security. Design and implement secure network architectures Zero Trust model. Utilize encryption protocols to secure data in transit and at rest. Configure and maintain for secure remote access. Harden network infrastructure by implementing security best practices. Use Use Security Information and Event Management (SIEM) tools for monitoring and responding to security incidents (IAM) solutions. Ensure timely application of security patches to network devices. Qualifications and
unauthorized access or leakage of sensitive information. Secure databases, including access controls, encryption monitoring and responding to security events related to data. Implement secure methods for transferring files field. Proven experience in roles related to data security, data management, or cybersecurity. Knowledge Strong communication skills for conveying data security concepts to technical and non-technical stakeholders and problem-solving skills for addressing data security challenges. Ability to collaborate with IT teams
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate with cross-functional teams to integrate security best practices into development and deployment processes
shared services, ensure Cyber and Information Security resilience, and act as technology governance and seeking an Agile Practice Lead to join our team and lead the adoption of Agile practices within our organization organization. As the Agile Practice Lead, you will play a pivotal role in developing and implementing an objectives.
seeking an Agile Practice Lead to join their team and lead the adoption of Agile practices within our clients clients organization. As the Agile Practice Lead, you will play a pivotal role in developing and implementing objectives.
seeking an Agile Practice Lead to join their team and lead the adoption of Agile practices within our client's client's organization. As the Agile Practice Lead, you will play a pivotal role in developing and implementing goals and objectives. Lead the adoption of Agile practices across teams and projects, providing guidance support. Ensure the consistent application of Agile practices by establishing standards, conducting audits, with organizational leaders to integrate Agile practices into the overall business strategy. Identify and
Description Information Security Services Development of Information Security Services capability and and to communicate feedback to enable associated security risk management. Perform Vulnerability testing compliance to security policies and standards. Develop and/or align information security policies to identify that proper IT security and information management measures are in place. Perform security audits and clean-ups policies and procedures. Document the information security principles and guidelines for application software
Reference: PE010794-Podu-1 Cyber Security Specialist Key Roles and Responsibilities: Determine who requires & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them. Good working knowledge of various security technologies such as network and application firewalls