responsible for identifying vulnerabilities and security risks in various IT systems, applications, and simulate cyber-attacks to test the effectiveness of security measures and to identify any weaknesses before Bachelor's degree in computer science, Information Security, or at least two years' experience. Relevant certifications certifications such as OSCP (Offensive Security Certified Professional), CEH (Certified Ethical Hacker) similar role in cybersecurity. Strong knowledge of security across various platforms including Linux, Windows
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
Information Technology Operations, Engineering and/or IT Security function.
5 or more years of proven experience
overall IT operations environment, considering security, operational, and business requirements.
Conduct
vulnerability assessments to identify potential security risks and prioritize patching based on criticality
systems, and applications.
Collaborate with the security team to evaluate the risk associated with unpatched
coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
of user and risk impact. Use a wide spectrum of security and technical expertise to contribute to the modernisation IT-related functions 5 years in Design, experience in Security Domain required. TOGAF Certification, ITIL (Information (Information Technology Infrastructure Library) Security Domain-related certifications preferable. End-to-end Concepts and Architecture Systems Analysis and Design Security Concepts Cloud infrastructure and DevOps deployments Configuration Engineering Lead, IAM Solutions, Security, Cyber security, TOGAF, ITIL, Linux, Wintel, Java, Javascript
overall IT operations environment, considering security, operational, and business requirements.
Implement
overall IT operations environment, considering security, operational, and business requirements.
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management