activities utilizing a CRM system. Ensure proper transitioning of customers to carrier in line with customer
of all technical security areas including but not limited to cyber and data security. The purpose of this this role is to ensure ICT security integrity and technical support. Key responsibilities: - Ensure efficient - Ensure auditing of security policies and procedures. - Update cyber security policies. - Coordinate stakeholders. - Input into the development of security policies. Qualifications, Knowledge, Skills & /Information Management - Certified Information Security Manager (CISM) - Certified Ethical Hacker (CEH
in the security reporting. Be responsible for the SecDevOps of the Endpoint Protection, security platform for the verification, planning and actioning of security topics together with other IT teams. Continuously work on improving the operational stability and security. Work on operations, troubleshooting and maintenance maintenance topics to continuously improve the security posture of our platforms Test and integrate new features Experience with security standards and their implementation Experience with Security solutions (OnPrem/Cloud)
for the company to follow.
road map for the company to follow. Build the transition architecture to connect the current to the future system architecture and design for data, workflow, security, hardware integration, operating system environment of availability, efficiency, scalability, and security. Assist Enterprise Architects in socializing and
guidance and solutions on technical problems. Ensure transition to the future mode of operation by participating formats. Operating system principles, basic IT security. Advanced experience in one or more of the following Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems Analysis
solutions on technical problems.
guidance and solutions on technical problems. Ensure transition to the future mode of operation by participating formats. Operating system principles, basic IT security. Advanced experience in one or more of the following Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems Analysis
guidance and solutions on technical problems. Ensure transition to the future mode of operation by participating formats. Operating system principles, basic IT security. Advanced experience in one or more of the following Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems Analysis
Certifications Security+