Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
troubleshooting system-related issues and ensuring system security and availability. You will need Certifications design, implementation, and maintenance; system security concepts and protocols and cloud computing. DUTIES: customers. Maintain system security by monitoring system activity, implementing security policies and procedures procedures, and identifying and mitigating security threats. Ensure compliance with industry and organizational Experience with cloud computing. Knowledge of system security concepts and protocols. Advantageous – Bachelor's
as plugin conflicts, performance problems, or security vulnerabilities. Conduct thorough testing and and tools. Experience with website security and implementing security measures. Familiarity with UX/UI
This will also include replication, backups and security related to these servers and services. The ideal and related infrastructure. Ensure systems are secure and vulnerabilities are patched. Control and verify
proactive maintenance, automated alerts (including Security), changes, documentation maintenance, and other errors, malware, and all issues pertaining to security. To maintain efficiency and an ideal network environment
APIs. Develop solutions to improve performance, security, and scalability of systems. Collaborate with
and passwords, Oversee data backup and system security (e.g., user authorisation, firewalls), Prioritise
contact centres and Asterix. Ensure data integrity, security, and compliance with regulatory requirements.
debug issues in the existing codebase. Implement security and data protection measures, following industry
tools, including Unit, E2E, API, performance, and security tests: chai, mocha, sinon, jest. Understanding