highly skilled and experienced Engineering Lead: Security to join our client on a 12-month renewable contract Collaborate with cross-functional teams to identify security needs and develop solutions Develop and implement to improve the overall security posture of the company Conduct regular security assessments and audits remediation plans Stay up-to-date with the latest security trends, technologies, and best practices Manage industry standards and regulations related to security Qualifications: Bachelor's degree in Computer
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
our clients' security postures. - Assist in the development and implementation of security measures to assessments and penetration testing. - Analyze security breaches to identify the root cause and implement development of security policies, procedures, and guidelines. - Assist in the creation of security awareness - Knowledge of security frameworks and standards - Familiarity with various security tools and technologies
developing and executing ICT Infrastructure and Security roadmaps aligned with the Client's goals and objectives envisioning the future state of infrastructure and Security requirements within the Organization, identifying initiatives. Manage and implement ICT infrastructure and security, including network systems, servers, storage, cybersecurity. Oversee ICT infrastructure and security projects, ensuring adherence to timelines, budgets Develop and execute strategic ICT Infrastructure and Security roadmaps aligned with Client goals, contributing
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
area of expertise • Design and implement network security configurations for Cisco and other vendor switches end-system security assessment policies. • Operate and maintain the health of the network security system
Financial Systems, ensuring their availability, security, and optimal performance. Your responsibilities training sessions. Backup Disaster Recovery and Security Management: Develop and maintain backup and disaster processes, and maintain security policies and procedures. Monitor systems for security threats, taking preventive preventive actions, and staying current with security best practices. Minimum Selection Criteria: Tertiary
play a crucial role in ensuring the reliability, security, and performance of an organization's network expertise