requested. Patching and deploying security configuration to secure the Red Hat environment. Qualifications:
infrastructure blueprint, network technology and security. Develop strategies to manage and optimise cloud spending and ensuring cost effectiveness. Design secure and efficient migration of existing applications
users' access. Good understanding on Information Security controls. Qualifications: SAP certified, with
users' access. Good understanding on Information Security controls. Qualifications: SAP certified, with