and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
Financial Systems, ensuring their availability, security, and optimal performance. Your responsibilities training sessions. Backup Disaster Recovery and Security Management: Develop and maintain backup and disaster processes, and maintain security policies and procedures. Monitor systems for security threats, taking preventive preventive actions, and staying current with security best practices. Minimum Selection Criteria: Tertiary
networks, ensuring they operate efficiently and securely. This role involves providing technical support Ensure all devices are updated and comply with security protocols. Provide user support and training as Troubleshoot and resolve network issues. Ensure network security protocols are implemented and enforced. Report
Azure. They will oversee the IT infrastructure, security, and operations of the cloud-based platform, while like Azure Active Directory, DevOps, Monitor, Security Center, and Sentinel. Proficient in Microsoft Associate, Azure Solutions Architect Expert, or Azure Security Engineer Associate. Apply now For more IT jobs
building, maintaining, and documenting the network security infrastructure. Job Experience & Skills Required: Required: Relevant IT Networking and Security Certifications, plus appropriate Diploma Experience and
relationships with customers, ensuring best practices in security, cost, performance, and reliability. Prepare and
manage data solutions. Ensure data integrity, security, and compliance with industry standards and best
Maintaining company IT standards and procedures, network security and confidentiality of information. Hardware and
technical customer relationships, focusing on security, cost, performance, reliability, and efficiency
align with business objectives and prioritize data security, integrity, and compliance. Identify opportunities