of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
for designing, implementing and managing a highly secure network solution that protects against potential Firewalls, VPN, IDS/IPS, Web-Proxy, Cloud Security and Security Audits. Top candidates will be comfortable comfortable working with a variety of technologies, security problems, and troubleshooting of the network. Skills Formal Cisco certification ideal – CCNA/CCNP (Security) ● Formal Cloud certifications ideal – Azure & ideal ● The ability to evaluate system changes for security implications and the knowledge to make recommendations
every line of code undergoes rigorous quality and security checks before seamlessly integrating into our in shaping its secure and compliant future. RESPONSIBILITIES: Integration of Security Tools & Practices: Practices: Implement and maintain security tools within the CI/CD pipeline ensuring timely detection and vulnerabilities. Automated Security Testing: Set up and manage tools that perform automated security testing of applications as SAST, DAST, IAST, and RASP. Cloud Security: Ensure the secure configuration and deployment of cloud
every line of code undergoes rigorous quality and security checks before seamlessly integrating into our in shaping its secure and compliant future. RESPONSIBILITIES: Integration of Security Tools & Practices: Practices: Implement and maintain security tools within the CI/CD pipeline ensuring timely detection and vulnerabilities. Automated Security Testing: Set up and manage tools that perform automated security testing of applications as SAST, DAST, IAST, and RASP. Cloud Security: Ensure the secure configuration and deployment of cloud
information systems, ensuring they are up to date and secure. Collaborate with IT and system administrators data security and Manage user access and permissions within the systems to ensure data security and compliance from employees. System Security: Ensure that all supported systems are secure and uptotodate, with date date, with no security breaches.no security breaches. Resolution Time: Monitor and reduce the time taken
will be responsible for ensuring the stability, security, and efficient operation of our company's IT infrastructure troubleshooting, and performance tuning. - Conduct security audits and implement necessary measures to protect performance, and security. - Implement and manage virtual networks, subnets, and network security groups. - access solutions. - Monitor and manage network security, including intrusion detection and prevention
and IT infrastructure. Strong background in IT security and network management. Experience in technical solutions along with DR testing. Enhancing IT security through managing firewalls, endpoint detection detection and response (EDR), software services, security policies, and penetration testing. Designing, troubleshooting solutions along with DR testing. Enhancing IT security through managing firewalls, endpoint detection detection and response (EDR), software services, security policies, and penetration testing. Designing, troubleshooting
who thrives on optimizing performance, ensuring security, and driving excellence in our database systems recovery strategies to safeguard crucial data. Secure data with precise access controls, authentication Uphold data integrity. Keep databases up-to-date and secure through regular updates and maintenance. Plan for technical setups pertaining to SQL user creation and security permissions Critical thinking, Problem-solving
possess a deep understanding of cloud technologies, security protocols, and industry best practices, with a methodologies Working knowledge of relevant data privacy, security practices, and laws Skilled in performance optimization environment administration Familiarity with cloud security concepts Solid understanding of a wide range of services such as computer, storage, networking, and security Strong understanding of cloud-native technologies