Network security and virtualisation (Docker, VSphere, VirtualBox)Responsibilities:
and delivery of our software solutions. Your responsibilities will encompass building, maintaining, and availability. Security: Implement best practices for infrastructure and application security, including and changes in demand. Incident Response: Participate in incident response and recovery efforts, contributing Chef. Solid understanding of networking concepts, security principles, and best practices for cloud environments
developers. Enrolling users and maintaining system security. Controlling and monitoring user access to the and implementations. Implement advanced database security features. Audit user activity to ensure integrity practices and procedures. Data warehousing. Will be responsible for developing ETL packages and data warehousing
They provide reliable, stable, scalable, robust, secure and continually evolving high-volume transaction controlled, effective and efficient. Their responsibility is to develop, deliver and support applications High Usability Factor; is Reliable; has Effective Security and is Maintainable. Testing, verification and
Business Engagement function of our client that is responsible for Governance and IT Risk Management.
users
engineering spares/equipment
Responsibilities would include you to:
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
our Core network infrastructure. You will be responsible for maintaining and enhancing our IP core and network.
Responsibilities:
Technical:
Responsible for the national IP
management of the Core IP equipment.
Manage and secure all IP Peering and Peering policies.
Capacity
Transmission network.
Responsible for the management and security of the client's IP Space
guests to avoid possible security risks. Notifies management and/or security of
suspicious behavior
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration: