process of Vulnerability and Patch Management security solutions and provide enhancements for the client client. Administration of Vulnerability Management Security Solutions and researching, designing & developing vulnerability management solution. Maintain information security technology management based on the industry good applicable laws and regulations Ensure an ongoing security technology improvement program across the client client through the appropriate mechanisms such as security compliance audits, risk / vulnerability assessment
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process in cloud security best practices, including identity and access management, network security, and encryption;
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process services; Ensure the security of cloud environments through the implementation of security best practices;
and disaster recovery plans, and ensuring system security and compliance with industry standards. Role & and Linux servers, ensuring optimal performance, security, and availability; Implement and manage virtualisation resolving issues promptly; Implement and enforce security policies, including firewalls, antivirus software detection/prevention systems; Conduct regular security audits and vulnerability assessments, addressing Generate and analyse reports on system performance, security incidents, and other relevant metrics; Develop
will manage user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to optimise the performance and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for
managing user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to ensure the smooth operation and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for
business requirement, user documentation and user securities settings are up to date. Management of organisational manuals. System security: Maintain user access to the system as per the system security matrix and SOP
Management Performance Tuning and Optimization Data Security and Backup Data Integration and Migration Database
with the principles and practices of Information Security Management. It is incumbent on all employees to understand the policies of the company in ensuring the security of all information within the business. 8. Supporting supporting tools to comply with and manage information security risks; The position comprises delivery in the
with the principles and practices of Information Security Management. It is incumbent on all employees to understand the policies of the company in ensuring the security of all information within the business. 8. Supporting supporting tools to comply with and manage information security risks; The position comprises delivery in the