implement effective solutions to ensure OEE and flash centre targets are achieved. Responsible for continuous requirements within planned processes. Introduce process security measures within planned processes, configuration
data to the cloud, considering data integrity, security, and minimal downtime. Define a robust testing in the cloud environment. Conduct performance, security, and compatibility testing. Create detailed documentation tools offered by the cloud providers. Implement security best practices for the cloud environment. Ensure access controls, and compliance with security policies. Develop training materials for IT staff involved in project. Ability and willingness to coach and give training to fellow colleagues and users when required.
teams in order to find the best balance between security, operation stability and compliance for the onboarding writing Minimum of 3-5 years of experience in IT security, system administration, or related fields. Demonstrated (CyberArk, BeyondTrust, or Thycotic) Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific PAM technologies, security trends, and best practices through self-study, training programs, and professional
to coach and give training to fellow colleagues and users when required. User training Compiling of user Teamwork and communication skills Knowledge in IT security Knowledge in ITIL processes Any additional responsibilities
management measures as well as the identified security measures for the assigned applications. Controls for scalable, distributed systems Security of AWS services, securing design of VPC architectures RESTful
on time and accuracy. Ensure your systems are security compliant. Apply Pentest findings to your systems implementation Ability and willingness to coach and give training to fellow colleagues and users when required Release
Meet with end users and gather requirements. User training & User sign off. Compiling of user and operational relevant stakeholders. Ensuring that technical training and development of the feature team is identified systems and software continuously. Conducting security checks and audits on the product. Ensuring the project. Ability and willingness to coach and give training to fellow colleagues and users when required.
regression testing, user acceptance testing, security testing. Analyse and scope end-user authorisation authorisation roles. Preparing User Manuals and conducting training to business process owners Preparing cut-over
Meet with end users and gather requirements User training System testing/parallel runs System implementation ADVANTAGEOUS SKILLS Data and API Mining Knowledge on Security best practices Advanced monitoring of systems
Integration, performance and load testing and security testing using industry standard tools, fit for integration. Test data management. Performance, security and load testing. Evaluate test scenarios Execute REST-Assured, Soap-UI, Postman GitHub Advanced Security, Burp Suite, Contrast Assess, Grafana k6, Karate