employee records and HR documents are recorded, securely kept and confidentiality is maintained. Ensuring
employee records and HR documents are recorded, securely kept and confidentiality is maintained. Ensuring
organization. Design, develop, and maintain scalable, secure, and robust cloud-based applications and services cost-efficiency. Implement best practices in cloud security, governance, and compliance across Azure and AWS architectures. · Strong understanding of cloud security, networking, compliance, governance, and hybrid
organization. Design, develop, and maintain scalable, secure, and robust cloud-based applications and services cost-efficiency. Implement best practices in cloud security, governance, and compliance across Azure and AWS architectures. · Strong understanding of cloud security, networking, compliance, governance, and hybrid
EIGRP, OSPF and BGP. Ensure maximum up-time. IT Security Management – Develop emergency, recovery, and drive encryption. Ensure server room security. Compile yearly security report. Provide Pre- and Post-Sale
and value propositions to generate interest and secure sales. Provide technical expertise: Demonstrate timely follow-up and negotiation to close sales and secure contracts. Build and maintain client relationships:
and value propositions to generate interest and secure sales. Provide technical expertise: Demonstrate timely follow-up and negotiation to close sales and secure contracts. Build and maintain client relationships:
and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
soundproofing Battery compartment, Drainage & secureness of batteries All interior and exterior components Ensure dash-board clusters are presentable and secured. Ensure post-repair check-lists are done. Adhere