...Slack Atlassian Docusign ProofPoint GlobalSign
Assist in Knowledge Transfer for the implemented solutions. · Work with Security Governance Team to ensure compliance with Cybersecurity-related regulations and industry standards.
Daily Operational Tasks...
...Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Troubleshooting security and network problems.
Responding to all system and/or network security breaches....
...The Customer Experience Design Head leads design and execution oversight of compelling and creative experiences that strike a balance between the consumers’ intent and the business’s needs. The role contributes in aligning the product roadmaps with the consumer needs...
...operations and IT service support, with the goal to deliver high availability, performance, and capacity, in a cost effective and secure manner.
Oversee the development of desktop services and management of the ongoing end user support services once developed to...
...with our middleware, database systems, and CMS. Reporting to the Head of Technology, you will play a vital role in delivering robust... ...understanding of cybersecurity principles and practices, including secure coding techniques, data protection, and authentication...
...Site
Leads budget forecasting and monthly monitoring and reporting of functional expenses, collaborating closely with functional heads to proactively identify opportunities and risks to ensure spending is within or lower than budget.
Managing and driving...
...and issues. Coordinate and conduct applicant drug screens, reference checks, background checks, motor vehicle checks, and social security number verification. Maintain applicant flow, drug screen, orientation and transfer request logs. Create and maintain new hire and...
...platforms including Office 365, Azure and AWS
Install, configure and test client systems including line of business applications, security, networking, servers and workstations.
Work with highly experienced Engineers and Technical Account Managers to deliver best...
...managing Campus and Branch Network Equipment;
Managing Wi-Fi and fixed lines and ensuring the stability and usage are compliant to security standards;
Managing telephony routers and equipment and ensuring stability and uptime;
Coordinating with partner vendors...
...frameworks, data quality standards, and data lifecycle management processes. Ensure compliance with data privacy regulations and security practices.
Collaboration - Collaborate with cross-functional teams including data scientists, analysts, software developers,...
...Azure
Strong Networking skills (LAN, WAN, TCP/IP, DNS & DHCP)
Firewalls (Fortigate, Meraki, Sophos UTM preferred)
Email Security Gateway/Anti Spam
Remote Desktop Services (RDS)
Benefits
~ Competitive salary package
~25 days paid days leave...
...(Laptops)
Formulate and create Office 365 SharePoint sites for domain users and external client access
Maintain a highly secure system through proper configuration and system access monitoring
Troubleshoot and resolve issues with user access to cloud services...
...processes
Developing high-performance applications by writing testable, reusable, and efficient code
Implementing effective security protocols, data protection measures, and storage solutions
Running diagnostic tests, repairing defects, and providing...
...service, covering configuration management of desktops, laptops and mobile devices for the conglomerate, ensuring compliance with security and hardening standards, while safeguarding end-user productivity. This area covers disciplines such as automated provisioning of...
...Infrastructure Engineer at Simplesat, you will own the AWS infrastructure, ensuring high availability, cost-effectiveness, and top-notch security and performance. You'll play a crucial role in shaping our culture and infrastructure as we grow.
In this position, you'll...
...processes
Developing high-performance applications by writing testable, reusable, and efficient code
Implementing effective security protocols, data protection measures, and storage solutions
Running diagnostic tests, repairing defects, and providing...
...processes
Developing high-performance applications by writing testable, reusable, and efficient
code
~ Implementing effective security protocols, data protection measures, and storage
solutions
Running diagnostic tests, repairing defects, and providing...
...and project managers, to ensure successful project delivery.
# Lead comprehensive testing efforts to ensure the reliability, security, and high quality of developed solutions.
# Create detailed technical documentation, including architecture diagrams, design specifications...
...and project managers, to ensure successful project delivery.
# Lead comprehensive testing efforts to ensure the reliability, security, and quality of developed solutions.
# Create detailed technical documentation, including design specifications, architecture...
...development strategy aligned with the organization's goals and objectives.
• Identify training needs through collaboration with department heads, HR, and performance appraisal systems.
• Design and deliver engaging and effective training programs, both in-person and through...
...telecommunications and utilities sectors. With global call center delivery capabilities, our multi-shore, multi-language programs offer safe, secure infrastructure, value-based pricing, skills-based resources and exceptional customer service - all backed by TELUS, our multi-...
...The Project Manager plans and executes projects, secures resources, tracks progress, and communicates with team members and clients. They verify contract details and establish realistic schedules, provide regular updates, and adjust deliverables as needed. The Project...
...The Governance, Risk and Compliance Lead will be responsible for developing and maintaining the information security policies, processes, programs, and project plans. In order to support and maintain the Information Security Management System (ISMS) being established...
...telecommunications and utilities sectors. With global call center delivery capabilities, our multi-shore, multi-language programs offer safe, secure infrastructure, value-based pricing, skills-based resources and exceptional customer service - all backed by TELUS, our multi-...
...Environment and enterprise-level LAN, WAN and WLAN engineering design and implementation.
Good knowledge of network environment security and discipline, capacity planning, and general network management best practices.
Good knowledge of enterprise monitoring/...
...in Azure
Strong Networking skills (LAN, WAN, TCP/IP, DNS & VPNs)
Firewalls (Fortigate, Meraki, Sophos UTM preferred)
Security competence include in Email Security Gateways/Anti Spam/Anti Phishing
Qualifications:
Several years of extensive experience...
...tune up: sessions, locks, peaks, io, waits, etc.
● HADR failover and management for different DBMS.
● Provides Support to Global Security Audits acting as POC from IT Database Administration
Team within the Auditor Interviews and evidence asks.
● Collaborate with...
...Atlassian g.) Docusign h.) ProofPoint. i.) GlobalSign
Assist in Knowledge Transfer for the implemented solutions.
Work with Security Governance Team to ensure compliance with Cybersecurity-related regulations and industry standards.
Requirements
Minimum...
...telecommunications and utilities sectors. With global call center delivery capabilities, our multi-shore, multi-language programs offer safe, secure infrastructure, value-based pricing, skills-based resources and exceptional customer service - all backed by TELUS, our multi-...
...telecommunications and utilities sectors. With global call center delivery capabilities, our multi-shore, multi-language programs offer safe, secure infrastructure, value-based pricing, skills-based resources and exceptional customer service - all backed by TELUS, our multi-...