and controlling work input and scope to ensure that all projects remain on track and in control Ensuring based on agreed company methodologies, tools, and processes Planning and managing program stakeholders, scope necessary Report on financial progress on the project, control variances and ensure approvals Following the change activities Leverage a change management methodology, process and tools to create a strategy to support adoption
and other end point solutions, Network Access Control solutions, DNS clusters, Cloud security, mail and and necessary documentation for services and processes undertaken within the Information Security team information risk analysis, assessment and acceptance processes. Maintains awareness of the implication of legislation firewalls, IPS, DNS, Mail gateways, Network Access Control, endpoint security solutions, PKI, Security Operations
Consulting creates and operationalises delivery processes for technology consulting services to ensure that employees/ID's to facilitate user creation Map site processes Order Network point installations/ID Station setups with Training on the users - Implement change process and business support where and if needed. Double online support until site is comfortable. Daily controls – Review daily and assist users in closing cycles
Responsibilities: Analyze information to identify security control and/or capability gaps that impacts the organization's remediation of vulnerabilities Enhance the current controls and oversight of the various compute environments Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that
implement innovative technologies to improve business processes and product offerings. Provide second-line technical minimizing downtime and risk. Adhere to the change control process, maintaining system integrity and compliance drive operational efficiency and enhance business processes. A proven track record of working independently Participate in the process design or re-design and translate business/user requirements/ processes into a system requirements, specifications, business and systems processes and recommendations related to proposed solution
Ensure you know and follow the incident and change processes, Perform Problem management analyses and duties Sound understanding of security operational processes and controls Demonstrable understanding of complex inter-relationships inter-relationships in an overall system or process Maintain up-to-date knowledge of security threats
strategic technology partners and vendors Reporting on process progress and change management. Project management risk management Budget planning, forecasting and control. Strategic and visionary software expert Enterprise
and complex tasks. This will include supporting processes like Request, Incident, Problem, Change, CMDB applications that deliver enterprise-wide business processes to our customers. The ideal candidate is knowledgeable Performs incremental testing actions on code, processes, and deployments to identify ways to streamline
integration, automated workflow and back-end processing. (Linux, Microsoft Wintel, Java, Java scripting Summary Change Management, Continual Improvement Process, Incident Management, Information Technology (IT)
Agile and Software Development Life Cycle (SDLC) processes, cloud computing, ITIL, COBIT Facilitation Investigation/