ICT policy breaches. Administers all security solutions in the Information Security domain including, Proxy solutions, Anti-Virus and other end point solutions, Network Access Control solutions, DNS clusters and implements information security technical solutions to meet business requirements. Develops, implements gateways, Network Access Control, endpoint security solutions, PKI, Security Operations Centre tasks and vulnerability skills Skills Summary Network Design, Networking Solutions, Network Maintenance, Network Monitoring, Network
responsible for tracking technical issues and finding solutions for problems that may arise. Responsibilities alignment. Partner as a technical liaison between customers and engineering teams. Assist with recruiting weekly status meetings. Assess risks and identify solutions to timely, efficient achievement of program goals
Responsibilities: Analyse problems and formulate IAM solutions based on organizations boundaries, architectures and business stakeholders. Decomposition of the solution and assisting with the scheduling/sequencing work for robust Identity and Access Management (IAM) solutions as a foundation to Cyber related defenses Requirements: Delivery, System Configuration Engineering Lead, IAM Solutions, Security, Cyber security, TOGAF, ITIL, Linux
Ensures that the project delivers the as-sold solution, remains within baseline budget, and is delivered ability to work at client sites Ability to manage customer satisfaction, commitment, and expectations to financial constraints Skills Summary Business Acumen, Customer Centricity, Information Technology Infrastructure
aspects of enterprise technology strategies and solutions meet the client's requirements. This role will (ABC Indicator/Packspec/product groups) Setup the customer SLED table as per product shelf life and requirements
posture Provide advice and consultancy to internal customers on application and infrastructure threats and