- Ensure that you are up to date on industry trends and imaging technologies associated with Security
- Analyse IT specifications to assess security risks as well as act on privacy breaches and malware threats
- Monitors compliance with security policies, standards, guidelines and procedures
- Assesses potential items of risk and opportunities of vulnerability in the network and on information technology infrastructure and applications
- Review risk assessments analyse the effectiveness of information security control activities and reports on them with actionable recommendations
- Provide guidance on business continuity and disaster recovery design and implementation for enterprise-wide disaster recovery management programs, including maturity models, methodologies, sourcing strategies, plans, metrics and scorecards for all components of the program with the Service Delivery Team
- Provides security advice on application and infrastructure related projects to ensure that security issues are addressed throughout the project life cycle
Key Requirements
- Experience in onboarding assets to PAM (Privilege Access Management)
- Past IGA/IAM/PAM Implementation Experience.
- Experience in managing Windows and Linux Systems.
- Experience in writing technical documentations/processes and procedures.
- Well-developed interpersonal and communication skills.
If this sounds like you:
Apply! Or drop me a line at *********@infopeople.com.au OR give me a call on 0282274*** to discuss further. If we believe you're a good match, we'll get in touch with you to let you know the next steps!
Additional informationInfopeople - Josie Bandiola
- Onboarding Assets to PAM (Privilege Access Management)
- IGA/IAM/PAM Implementation Experience
- Windows and Linux Systems Management