towards decisions that are both profitable and secure Requirements:
and design principles, contributing towards safe, secure, and reliable End User Workspace solutions and Recognized M365 certifications: Microsoft 365 Security Administrator Associate, Identity and Access Administrator information management policies and processes related to securing data in Microsoft 365. Strong experience working
be conversant in the principles of maintenance, security, energy and asset management.
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience ESXi Disaster Recovery/Risk Management Firewall / Security Experience Knowledge of Contact Centre Technologies
shared services, ensure Cyber and Information Security resilience, and act as technology governance and and use proper rules to ensure it is a clean and secure implementation. What will make you successful in and software Financial advice and support System security Advanced analytics to address business requirements
be conversant in the principles of maintenance, security, energy and asset management. Good understanding infrastructure and assets for optimal performance, safety, security, cost effectiveness and longevity. Provide support electrical infrastructure, communication systems and security systems. Respond to emergent situations and provide
be conversant in the principles of maintenance, security, energy and asset management. Good understanding infrastructure and assets for optimal performance, safety, security, cost effectiveness and longevity. Provide support electrical infrastructure, communication systems and security systems. Respond to emergent situations and provide
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The and applications. Working knowledge of Web site security measures, such as firewalls and message encryption; such as reporting formats required, costs, or security needs to determine hardware configuration; Understand inquiries; and Monitor security system performance logs to identify problems and notify security specialists if
switches
Strong understanding of network security principles and practices
Excellent problem-solving