Identity Management, Switching and Routing Protocols, Microsoft and Linux Operating Systems, Network Functional Protocols and VPN.
Creating, and maintaining enforceable policies and supporting processes, and ensuring compliance with regulatory requirements
Creates information security strategies, both short-term and long-range, in support of the Organization's goals.
Involvement in planning and implementing security measures to protect computer systems, networks, and data.
Information technology specialist is expected to stay up to date on the latest intelligence, including hackers’ methodologies to anticipate security breaches.
Responsible for preventing data loss and service interruptions by researching new technologies that will effectively protect a network.
Acts proactively to prevent potential disaster situations by ensuring that proper protections are in places, such as intrusion detection and prevention systems, firewalls, and effective physical safeguards, and provides for the availability of computer resources by ensuring a business continuity/disaster recovery plan is in place to offset the effects caused by intentional and unintentional acts.
Evaluates security incidents and determine what response, if any, is needed and coordinates organization responses, including technical incident response teams, when sensitive information is breached.
Implements security improvements by assessing the current situation; evaluating trends, and anticipating requirements.
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل.
نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا