responsible for identifying vulnerabilities and security risks in various IT systems, applications, and simulate cyber-attacks to test the effectiveness of security measures and to identify any weaknesses before Bachelor's degree in computer science, Information Security, or at least two years' experience. Relevant certifications certifications such as OSCP (Offensive Security Certified Professional), CEH (Certified Ethical Hacker) similar role in cybersecurity. Strong knowledge of security across various platforms including Linux, Windows
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
join a highly motivated and energetic team of security specialists to provide Fortinet firewall support advantageous
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
Information Technology Operations, Engineering and/or IT Security function.
5 or more years of proven experience
overall IT operations environment, considering security, operational, and business requirements.
Conduct
vulnerability assessments to identify potential security risks and prioritize patching based on criticality
systems, and applications.
Collaborate with the security team to evaluate the risk associated with unpatched
coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
responsible for overseeing the maintenance and security of company's data centre and server environments and resolve technical issues. Implementation of security configurations & patching in line with organisational organisational requirements. Ensure security through access controls, backups, and firewalls. Upgrade systems background Linux installation, configuration, security and troubleshooting. Experience with databases services such as DNS, TLS/SSL, HTTP Knowledge of security best practises and data backup/recovery The ability