unauthorized access or leakage of sensitive information. Secure databases, including access controls, encryption monitoring and responding to security events related to data. Implement secure methods for transferring files field. Proven experience in roles related to data security, data management, or cybersecurity. Knowledge Strong communication skills for conveying data security concepts to technical and non-technical stakeholders and problem-solving skills for addressing data security challenges. Ability to collaborate with IT teams
JOB DESCRIPTION Key Responsibilities: Security Monitoring Perform log ingestion, define use cases, and health checks and remediate accordingly. Monitor security alerts and events using various tools and technologies technologies. Analyze and investigate security incidents to identify potential threats. Collaborate with environment. Incident Response Respond promptly to security incidents, provide initial analysis, conduct business maintain endpoint security and EDR solutions. Perform daily health checks endpoint security and EDR solutions
systems, and other security appliances for network security. Design and implement secure network architectures Zero Trust model. Utilize encryption protocols to secure data in transit and at rest. Configure and maintain Networks (VPNs) for secure remote access. Harden network infrastructure by implementing security best practices practices. Use Security Information and Event Management (SIEM) tools for monitoring and responding to security (IAM) solutions. Ensure timely application of security patches to network devices. Qualifications and
unauthorized access or leakage of sensitive information. Secure databases, including access controls, encryption monitoring and responding to security events related to data. Implement secure methods for transferring files field. Proven experience in roles related to data security, data management, or cybersecurity. Knowledge Strong communication skills for conveying data security concepts to technical and non-technical stakeholders and problem-solving skills for addressing data security challenges. Ability to collaborate with IT teams
Facilities Management, Health and Safety, as well as Site Security.
management, participation in our HSSE (Health, Safety, Security, and Environment) management program, team Time KPI. Safety Incidents and Lost-Time Injuries: Promote a culture of safety and track safety incidents a safe working environment. Monitor and manage Safety Incidents and Lost-Time Injuries KPI. Cost Management: strategies, demand forecasting techniques, and security measures. Monitor and manage Stockout Rate and accuracy, order completion rates, and adherence to safety protocols. Monitor and manage Employee Productivity
management, participation in our HSSE (Health, Safety, Security, and Environment) management program, team Time KPI. Safety Incidents and Lost-Time Injuries: Promote a culture of safety and track safety incidents a safe working environment. Monitor and manage Safety Incidents and Lost-Time Injuries KPI. Cost Management: strategies, demand forecasting techniques, and security measures. Monitor and manage Stockout Rate and accuracy, order completion rates, and adherence to safety protocols. Monitor and manage Employee Productivity
Facilities Management, Health and Safety, as well as Site Security. Provide training and ensure multi-skilling manage operational risk, and provide and maintain a secure and safe working environment. Develop annual site warehousing requirements. Manage the security infrastructure, safety of staff, plant, and assets. Lead the requirements, together with Management. Co-ordinate safety or regulatory compliance activities with zero findings site sales and profitability. Ensure Health & Safety rules and regulations are adhered to and take corrective
systems, and other security appliances for network security. Design and implement secure network architectures Zero Trust model. Utilize encryption protocols to secure data in transit and at rest. Configure and maintain Networks (VPNs) for secure remote access. Harden network infrastructure by implementing security best practices practices. Use Security Information and Event Management (SIEM) tools for monitoring and responding to security (IAM) solutions. Ensure timely application of security patches to network devices. Qualifications and
improving performance, procuring resources and securing compliance. You should mentor your team members and ensure compliance Coordinate with the HR department to ensure our hiring plans meet our business