requested. Patching and deploying security configuration to secure the Red Hat environment. Qualifications:
infrastructure blueprint, network technology and security. Develop strategies to manage and optimise cloud spending and ensuring cost effectiveness. Design secure and efficient migration of existing applications
users' access. Good understanding on Information Security controls. Qualifications: SAP certified, with
users' access. Good understanding on Information Security controls. Qualifications: SAP certified, with
enterprise information architecture; 12) Knowledge of security Firewalls; 13) Knowledge and experience in Microsoft (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server); 14) Knowledge
development, design principles, functionality, and security management - Technology infrastructure networking
appropriate; 5) Taking account of the needs for quality, security, availability and safety, utilizing, as necessary