data to the cloud, considering data integrity, security, and minimal downtime. Define a robust testing in the cloud environment. Conduct performance, security, and compatibility testing. Create detailed documentation any customizations made during the migration. Coordinate with cloud service providers to optimize the tools offered by the cloud providers. Implement security best practices for the cloud environment. Ensure encryption, access controls, and compliance with security policies. Develop training materials for IT staff
Integration, performance and load testing and security testing using industry standard tools, fit for and maintenance and preparation of test data. Coordination between development and support environments integration. Test data management. Performance, security and load testing. Evaluate test scenarios Execute REST-Assured, Soap-UI, Postman GitHub Advanced Security, Burp Suite, Contrast Assess, Grafana k6, Karate
of a Specialist: Component and Vehicle Flash Coordinator (Entry) - Rosslyn Amazing brand with cutting requirements within planned processes. Introduce process security measures within planned processes, configuration
online ecommerce system easy to use, speedy and secure. • Manage the day-to-day tasks related to the online implementing changeovers etc. • Work with marketing coordinator to plan and implement strategies to ensure profitability
on time and accuracy. Ensure your systems are security compliant. Apply Pentest findings to your systems support) SAP HANA experience SAP Charm process Coordinate basis tasks with SAP05 / Linux and other teams
will be to ensure the stability, performance, and security of our SAP systems, enabling seamless business efficiency. Lead efforts to establish and enforce SAP security policies, ensuring compliance with industry standards standards and regulations. Conduct regular security audits and implement measures to mitigate potential upgrades, and migrations. Strong background in SAP security and compliance management. Demonstrated expertise
teams in order to find the best balance between security, operation stability and compliance for the onboarding writing Minimum of 3-5 years of experience in IT security, system administration, or related fields. Demonstrated (CyberArk, BeyondTrust, or Thycotic) Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific on the latest developments in PAM technologies, security trends, and best practices through self-study
ADVANTAGEOUS SKILLS Data and API Mining Knowledge on Security best practices Advanced monitoring of systems data streaming services such as Apache Kafka Coordination between development and support environments
applications within AWS CloudWatch. Applying cloud-security patterns and concepts to the solutions and deployments
Teamwork and communication skills Knowledge in IT security Knowledge in ITIL processes Any additional responsibilities