Planning Security and risk Aware, Risk Identification and rectification to possible security vulnerabilities vulnerabilities Reaction to identified Security threats on all platforms, physical and virtual Backup monitoring foundation or intermediate, ISO 27000, other IT security Training Prince2, PMP or equivalence - Advantage
Planning
type="circle">
Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices meet the organization's requirements in terms of security, performance, scalability, and cost-effectiveness background in areas such as networking, databases, and security, as well as experience with cloud platforms and
/>covering all new developments in the governance and security space.
Maintain ICT services schedule of
through secure internet gateways
and encryption of electronic data
Manage the secure storage
sector best practice.
Management of personnel security through implementation of "need to
know"
Management of physical security through the use of access control,
security surveillance and alarm
alarm systems as well as secure storage for
assets.
Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices meet the organization's requirements in terms of security, performance, scalability, and cost-effectiveness background in areas such as networking, databases, and security, as well as experience with cloud platforms and
meet the business requirements while ensuring the security, compliance, and availability of data to the FIC's requirements. • Database security - define and implement security controls and security policies and procedures processes and policies to ensure data integrity and security. • Service provider management - manage relationship using MSSQL. • Database security - plus five (5) year experience in database security configurations and implementations
day administration. Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. Maintains the business-as-usual activities around software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication office 365 for Enterprise. Knowledge of Cloud Security and patch management processes on Cloud environment
day administration. Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. Maintains the business-as-usual activities around software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication office 365 for Enterprise. Knowledge of Cloud Security and patch management processes on Cloud environment
providing secure cloud transformation by combining Microsoft cloud technology with cyber security, and managed ensure, stability, availability, performance and security of services Maintaining documentation quality and assess their effectiveness Oversee and test security measures, such as access authentication and disaster Familiarity with access control models and network security. Knowledge of Cisco, Juniper and Fortigate network