Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
will also need experience with Network & Web security, API calls, REST & SOAP, Git, GitHub, Advanced operating environments e.g., Windows Server Admin, Linux Admin. Design algorithms. Design of Spec & Kubernetes Additional Experience – Network security & Web security API calls, REST & SOAP Version controlling
Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS).& 3 years' work experience Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS). AWS Associate level Certifications experience with – MuleSoft Integration experience (admin, operational and development with be advantageous) Experience in Kubernetes architecture, Networking, Security, Deployment, and Management. Infrastructure as technologies experience like SOAP and REST. Web Security protocols experience like OAuth, JWT, OIDC. Capable
EIGRP, OSPF and BGP. Ensure maximum up-time. IT Security Management – Develop emergency, recovery, and drive encryption. Ensure server room security. Compile yearly security report. Provide Pre- and Post-Sale all his/her questions enabling them to take an informed decision. Prepare technical documentation containing containing Request for Proposal (RFP) and Request for Information (RFI). Work alongside Account Managers and Sales Assist Sales team in creating product/technical information and diagrams. Hardware infrastructure Management
troubleshooting system-related issues and ensuring system security and availability. You will need Certifications design, implementation, and maintenance; system security concepts and protocols and cloud computing. DUTIES: customers. Maintain system security by monitoring system activity, implementing security policies and procedures procedures, and identifying and mitigating security threats. Ensure compliance with industry and organizational Experience with cloud computing. Knowledge of system security concepts and protocols. Advantageous – Bachelor's
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements Requirements include a National Diploma in Information Technology, Microsoft Server Certification, and Linux Qualifications Required: National Diploma in Information Technology or equivalent Degree/Diploma Microsoft Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience 2016 and 2019) Backup and Recovery Internet Information Services (IIS) Nagios and Monitoring Linux (Ubuntu)
Bachelor's Degree/Diploma in Computer Science, Information Technology, or related field; have 5 years of storage, and Telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure operational resilience. IT Security and Compliance – Develop and enforce IT security policies, procedures, mitigate Cybersecurity risks. Conduct regular security assessments and audits to identify vulnerabilities Cybersecurity best practices and ensure a culture of security awareness. Strategic Planning and Leadership –
program's growth goals while ensuring reliability, security, and robustness. You'll also collaborate closely bachelor's degree or formal certification in Information Technology, Computer Science, or a related field integration / deployment Managed source control Security guidelines Controlling & minimising technical with and serve the company's wider scale goals securely with 99% uptime Guiding and managing the design developments, and trends, incl: Information Technology Information Networks UX Design Identifying and
optimizing internal tools and workflows, ensuring security, and managing development and cloud infrastructure tools and workflows to improve efficiency. Ensure security measures are in place for development and cloud and cloud infrastructure, best practices, and security. CS fundamentals in object-oriented design, data processes and domains. ATTRIBUTES: Examining Information Developing Expertise Making Decisions Showing
in a clear and concise manner, tailoring the information to the audience's needs. Data-driven Decision optimization based on data analysis. Data Governance and Security - Ensure compliance with data governance policies policies, data protection regulations, and security protocols. Adhere to data privacy and confidentiality confidentiality standards when handling sensitive information. Contribute to the development and maintenance of data