Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to company Cyber Security Strategy across the company entity. Achieve and maintain and target Cyber Security Maturity cyber programmes Design, Develop and Implement a Security Programme for company No or per target Internal findings related to company for Cyber Security Ensure a Cyber Security Incident Response Practice is in place
3-to-5-year cyber security strategy across the company Achieve and maintain and target cyber security maturity programmers. Support the design, develop and implement a security programmer for the company No or per target Internal findings related to the company for cyber security Ensure a cyber security incident response practice is in place place across the company Promote awareness of security policies, training, and the governance strategy amongst all levels of the company to ensure sound security governance is reflected across the entity Actively
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
Operations Engineer to serve as the Feature Owner for Security Tools. The successful candidate will be responsible Protection security platform components and tools, ensuring operational stability and security. Key Responsibilities: Protection, and security platform components and tools. Verify, plan, and action security topics in collaboration Continuously improve operational stability and security, working on operations, troubleshooting, and maintenance integrate new features to enhance security posture. Ensure security-related requirements, compliance,
experience. – (essential). - - Automation/Performance/Security scripting. – (essential). - - SQL experience. (essential). - - GUI/API automation/performance/security solutions using different tools. – (essential) non-functional / functional testing – performance testing, security testing, automation testing and usability testing
requested. Patching and deploying security configuration to secure the Red Hat environment. Qualifications:
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration:
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration:
infrastructure blueprint, network technology and security. Develop strategies to manage and optimise cloud spending and ensuring cost effectiveness. Design secure and efficient migration of existing applications
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security.
Key Roles and Responsibilities
protocols