of Linux and Unix systems to ensure top-notch security and optimal performance. Take the lead in setting Hat and Alma Linux servers, ensuring seamless operations. Monitoring server health using cutting-edge promptly applying security patches and conducting daily system checks. Empower users with secure access through meticulous management of user permissions and regular security audits. Be the go-to expert for software installation maintenance on UNIX servers, fostering a smooth operational environment. Enhance web services reliability
responsible for the control of internal IT assets, Biometric access system control , The applicant must regulations and policies related to data privacy, security, and access Managing relationships with IT vendors
procedures to add value to company. Deliver operational reports by complying to service level agreements through application and checking of processes Control cost by managing time and resources Develop outputs and take corrective action according to level of control Communicate dependencies to project team Job Responsibilities Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement
building, maintaining, and documenting the network security infrastructure. Job Experience & Skills Required: Required: Relevant IT Networking and Security Certifications, plus appropriate Diploma Experience and Systems, Intrusion Detection Systems, Network Access Control (NAC), and Virtual Private Networks (VPN) If you
understanding of Azure DevOps, CI/CD pipelines, Version Control systems such as Git and have experience working expertise in areas, including CI/CD pipelines, Version Control systems like Git, automation techniques. Knowledge workflows within Azure DevOps. Security Awareness: An understanding of Security practices to ensure that Development Development processes align, with Security requirements. Documentation Skills: The ability to document
status. They are now looking for an IT Finance, Control & Legal Functional Relationship Manager within shares the Business requirements/insights with IT, secures the required IT resources and brings the right management and communication during P1/P2 situations. Security, Compliance & Risk Management Accountable within their product are delivered and maintained secure and compliant with internal standards and external (creative to bring value to the business in a controlled risk environment). Minimum Requirements Bachelor's
applications meet performance, availability, and security requirements Support and maintain existing RFID Queue (MQ) systems (MQTT). Understanding of IT security: authentication and authorization (JWT), encryption hardware/software vulnerabilities, and network security. Understanding of DevOps processes. Proficient Proficient understanding of development flow and source control (GIT). Understanding of design methodologies (UML) Models (OSI layers), TCP/IP schema, and firewall controls (Iptables). Proficient understanding of system
other application support NetSurIT Cloud operation security centre) Computer builds (standard company other office facilities such as connectivity, security, working environments, telephones, multi-functional offices and user machines via Microsoft cloud operation security centre Support users across the branch network with finance team Assist with lease renewals, security renewals, cleaning service renewals, etc. Personal principle continuously and self –measure Move from operational chasing to more strategic value add responsibilities
Ensuring code is secure, following security best practices, and addressing security vulnerabilities promptly promptly. Properly using version control systems (e.g., Git) for code management and collaboration. Identifying Assurance: Ensuring the software meets quality and security standards. Writing and maintaining unit tests
reliability while adhering to best practices and security standards. Design and Architecture: Collaborate reliability of cloud services. Security and Compliance: Implement security best practices and compliance for AWS environments. Configure and manage AWS security services such as AWS Identity and Access Management Management (IAM), AWS WAF, AWS Shield, etc. Conduct security assessments and audits, and remediate vulnerabilities tools (CI/CD pipelines, version control, etc.). Knowledge of security best practices and compliance standards