and IT infrastructure. Strong background in IT security and network management. Experience in technical solutions along with DR testing. Enhancing IT security through managing firewalls, endpoint detection detection and response (EDR), software services, security policies, and penetration testing. Designing, troubleshooting solutions along with DR testing. Enhancing IT security through managing firewalls, endpoint detection detection and response (EDR), software services, security policies, and penetration testing. Designing, troubleshooting
in ensuring the functionality, reliability, and security of the company's devices, necessitating a deep and upgrade campaigns in response to bug fixes, security improvements, or functional upgrades Troubleshooting: configurations to optimize performance Security Measures: Implement and maintain security measures for hardware components and upgrade campaigns in response to bug fixes, security improvements, or functional upgrades Troubleshooting: configurations to optimize performance Security Measures: Implement and maintain security measures for hardware components
innovation. Engage in negotiations with suppliers to secure the best terms for pricing, timelines, and product innovation. Engage in negotiations with suppliers to secure the best terms for pricing, timelines, and product
innovation. Engage in negotiations with suppliers to secure the best terms for pricing, timelines, and product innovation. Engage in negotiations with suppliers to secure the best terms for pricing, timelines, and product
documentation Architecture overviews and diagrams Security policies and procedures System policies and procedures documentation Architecture overviews and diagrams Security policies and procedures System policies and procedures
market share. Coordinate new business accounts secured by the FSM and assess potential opportunities within market share. Coordinate new business accounts secured by the FSM and assess potential opportunities within
market share. Coordinate new business accounts secured by the FSM and assess potential opportunities within market share. Coordinate new business accounts secured by the FSM and assess potential opportunities within
and diagrams Integration and dependency mapping Security policies and procedures System policies and procedures and diagrams Integration and dependency mapping Security policies and procedures System policies and procedures