impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
which alerts are received via syslog & siem (security information & event managements). • Implement internet access. • Ensure all infrastructure and security systems are up-to-date. • Manage technical aspect conduct quarterly DR tests. Cyber Security role • Source security software applications and successfully external security providers and online security systems to use. • Source and manage external security providers providers. • Develop and execute security measures to monitor and protect sensitive data and systems from
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
they need in terms of security. Will be working for Good and Well known Security Companies. Previous experience sales consultants in the Security Industry. Previously working/selling for a Security Company is a must. have 2 - 4 years of experience selling in the Security Industry (Guarding/Armed Response) Must have
join a highly motivated and energetic team of security specialists to provide Fortinet firewall support advantageous
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
Information Technology Operations, Engineering and/or IT Security function.
5 or more years of proven experience
overall IT operations environment, considering security, operational, and business requirements.
Conduct
vulnerability assessments to identify potential security risks and prioritize patching based on criticality
systems, and applications.
Collaborate with the security team to evaluate the risk associated with unpatched
coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure