Information Technology Operations, Engineering and/or IT Security function.
5 or more years of proven experience
overall IT operations environment, considering security, operational, and business requirements.
Conduct
vulnerability assessments to identify potential security risks and prioritize patching based on criticality
systems, and applications.
Collaborate with the security team to evaluate the risk associated with unpatched
coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
responsible for overseeing the maintenance and security of company's data centre and server environments and resolve technical issues. Implementation of security configurations & patching in line with organisational organisational requirements. Ensure security through access controls, backups, and firewalls. Upgrade systems background Linux installation, configuration, security and troubleshooting. Experience with databases services such as DNS, TLS/SSL, HTTP Knowledge of security best practises and data backup/recovery The ability
responsible for overseeing the maintenance and security of company's data centre and server environments and resolve technical issues. Implementation of security configurations & patching in line with organisational organisational requirements. Ensure security through access controls, backups, and firewalls. Upgrade systems background Linux installation, configuration, security and troubleshooting. Experience with databases services such as DNS, TLS/SSL, HTTP Knowledge of security best practises and data backup/recovery The ability
delivering cutting-edge hardware and software-based security solutions in the ICT industry, is looking for They pride themselves on developing secure networking encryptors, secure mobile communications, and cryptographic Develop and maintain software applications for secure networking encryptors, mobile communications, and trusted operating system, ensuring its integrity and security. Collaborate with a diverse team to design custom Strong understanding of networking and network security. Systematic and analytical approach to problem-solving
Protection, and security platform components and tools.
of user and risk impact. Use a wide spectrum of security and technical expertise to contribute to the modernisation IT-related functions 5 years in Design, experience in Security Domain required. TOGAF Certification, ITIL (Information (Information Technology Infrastructure Library) Security Domain-related certifications preferable. End-to-end Concepts and Architecture Systems Analysis and Design Security Concepts Cloud infrastructure and DevOps deployments Configuration Engineering Lead, IAM Solutions, Security, Cyber security, TOGAF, ITIL, Linux, Wintel, Java, Javascript
responsibility of the Compliance Officer is to ensure that Security Personnel are in full compliance with standard Company's Disciplinary ‘Code of Conduct' • Ensure that Security Personnel are in full compliance with standard • Assist with training and induction of onsite Security personnel • Ensure that necessary On-Site Training License • 3 -5 years of experience in Shopping Mall Security experience • Firearm Competency will be advantageous advantageous • 3- 5 years of experience in the Security Industry • Previous Managerial Experience will be
service and security objectives, by maintaining sustainable and effective service and security monitoring investigation and remediation of service and security issues.     Â
overall IT operations environment, considering security, operational, and business requirements. Implement overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
overall IT operations environment, considering security, operational, and business requirements.
Implement
overall IT operations environment, considering security, operational, and business requirements.