Search Results: 10 vacancies
...major IT initiatives, transformation projects review of cyber-security systems and internal controls pertaining to Information system... ...practice auditing techniques.
Possess advance knowledge of network and application vulnerability assessment, IT practices, risk assessment...
...infrastructure, managing a team of IT professionals, developing and implementing IT policies and procedures, ensuring the security and integrity of university network and data, and providing technical support to faculty, staff, and students.
The IT Director directs the...
...Managing and storing data using computers, software, databases, networks, and servers. Writing programs, maintaining networks, analyzing... ...on factors such as reporting formats required, costs, and security needs to determine hardware configuration.
25. Determine system...
...their global teams. This includes:
Access to a Global Talent Network of 300,000+ professionals globally
Data-sciences based... ...Functions to build event-driven, cost-efficient applications.
Security : Implement robust security measures like IAM roles, VPC security...
...knowledgeable in cloud computing concepts & technologies
You are comfortable administrating Linux servers, including their storage and networking
You have hands-on experience with software automation
You are organized and want your team to deliver high-quality software...
...Understanding project specifications and developing time schedules and budgets that meet them.
Negotiating with vendors and contractors to secure the best prices.
Observing existing processes, analyzing staff performance, and addressing deficiencies accordingly....
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Project...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Procurement...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Construction...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Construction...