experience in VM cluster environment Installation of Redhat Linux Installation of Linux virtual guests – Linux Configuring Repositories,Yum and Rpm package installation,upgrades Upgrades of Redhat Linux systems Linux HTTP,BIND,LDAP System Security implementing Firewall Rules and IP tables Security-Enhanced Linux (SElinux)
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders topics. Install, configure, maintain and deploy virtual Apps and desktop images. Installation, Configuration e.g., Windows Server, Windows Multisession. Installation, Configuration, and maintenance of Published developing rest APIs using C# and .Net. Deploying secure Azure Application services, private endpoints etc
Detect faultfinding and make repair accordingly. Install, maintain, and repair electrical control, wiring work vehicle and job site are kept in a safe and secure manner. Ensure that compliance of all Occupational
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders topics. Install, configure, maintain and deploy virtual Apps and desktop images. Installation, Configuration e.g., Windows Server, Windows Multisession. Installation, Configuration, and maintenance of Published Essential Skills Requirements: Software package, installation & conversion tools, e.g. MSI. Experience application performance and worked with Software installation Capture tools. Experience in optimisation of
Department, where required, to evaluate existing installations and recommend improvements or alternatives to Department, where required, to evaluate existing installations and recommend improvements or alternatives to required technical project documentation.
Africa is looking for an Azure Infrastructure and Security Specialist to join their dynamic team. Use health up to date about security risk and mitigations to constantly strengthen the security Active participation implementation of Active Directory security concepts and IT Security Solutions in Azure Advanced network versioning systems like Git Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Microsoft Defender products and Active Directory security best practices. Should you not receive a response
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
enterprise IT network know-how, including network security (firewalling) - Container-based application virtualization enterprise IT network know-how, including network security (firewalling) WHAT WILL BE YOUR ROLE AND RESPONSIBILITIES (technical requirements as well as process or IT security governance requirements) - Go-live preparation
Collaborate with the Cyber Security team to develop and maintain security and permissions in all delivered
Unit tests, Regression tests, System Integration security tests including recording of results and change understanding of network configurations, firewalls, and security protocols. Familiarity with Java EE, Angular,