cyber security risks associated with various technologies and ways to manage them
various technologies and ways to manage them Good working knowledge of various security technologies such security tools, and network technologies Relevant knowledge of technological advances within the information map business needs to technology solutions Ability to discuss and report technology and information security security risk with non-technology and executive business stakeholders Ability to display analytical thinking
standards. Assesses and selects appropriate security technologies and solutions to protect digital assets. Implements standards. In-depth understanding of security technologies, tools, and best practices Excellent communication administration or a technology-related field required (e.g., computer science, information technology, etc.) MBA
programming language On premise virtualisation technology expertise Angular 6/7/8 Java 8 J2EE JDBC Junit Understanding of integration between different technologies Coordination between development and support
Provide analysis, reports and dashboards using BI technologies. Build star schemas when needed and reconcile problem-solvers who never concede defeat. Beyond IT and technology, we apply innovative solutions to complex problems
Provide analysis, reports and dashboards using BI technologies. Build star schemas when needed and reconcile problem-solvers who never concede defeat. Beyond IT and technology, we apply innovative solutions to complex problems
role
specifications. Take ownership of a particular solution/technology segment serving multiple cross-functional processes