business needs. Develop scalable, reliable, and secure IT architectures that support the organisation's practices in system configuration, networking, security, and performance optimization. Mentor and train Monitor network performance to ensure robust and secure connectivity. Stay up to date with emerging technologies customizations Networking: LAN/WAN VPN Firewall and Security Management Network Monitoring Tools (Wireshark
focus on security and networking . Manage network configurations and implement network security best practices concepts and protocols. Experience implementing security measures such as firewalls, VPNs, and encryption points Certifications such as CISSP, AWS-CSA, CCNA, Security. Experience with cloud computing platforms such
regarding development needs and opportunities, and secure resources to support development efforts as it provide to the Company will be held and/ or stored securely for the purpose of recruitment. Your Personal event, storage will be secure and audited regularly regarding the safety and security of the information
regarding development needs and opportunities, and secure resources to support development efforts as it provide to the Company will be held and/ or stored securely for the purpose of recruitment. Your Personal event, storage will be secure and audited regularly regarding the safety and security of the information
ensuring their performance, availability, and security. The role requires a blend of technical expertise in maintaining the integrity, performance, and security of the company's databases. They are expected and efficiency. Data Security and Backup: Implement and maintain database security measures to protect
ensuring their performance, availability, and security. The role requires a blend of technical expertise in maintaining the integrity, performance, and security of the company's databases. They are expected and efficiency. Data Security and Backup: Implement and maintain database security measures to protect
designing and implementing scalable, reliable, and secure architectures. You will work closely with cross-functional Design: Design and implement scalable, reliable, and secure solutions using Azure, AWS, IoT, and microservices technical specifications. Security: Ensure that solutions adhere to security best practices and regulatory
(Printers, Telecommunications, Renewable Energy, Security, Laser and Data projectors, Internet Solutions
(Printers, Telecommunications, Renewable Energy, Security, Laser and Data projectors, Internet Solutions
documents, always maintaining confidentiality and security of information. KEY PERFORMANCE AREAS Contribute