Search Results: 25 vacancies
...Office 365, Microsoft Intune / EMS, Online Protection, DLP, Information Protection Suite, Azure MFA Server, Azure AD Sync, ADFS Proxy & Windows Azure application and services.
Active Directory, Group Policies, IIS, Microsoft PKI Certificates, PowerShell, Scripting...
...processes and procedures, and provide instructions to subordinates to ensure their proper implementation.
Others:
27. Act as the proxy of the company at various industry forums as may be required.
28. Monitor and analyze guarantee claims and recommend on response....
...Computer Science
12 years experience in designing and implementing security technologies (Cisco ASA firewalls Juniper Blue Coat proxies IPS ISA and McAfee)
5 years in ICT security in the financial sector
Deep understanding of network security
Experience in Windows...
...proper implementation to support achieving the different set targets and plans, hence Nakilat strategy.
Others:
24. Act as a proxy for the company at various industry forums as well as other working groups and committees of charterers, operators, joint owners, etc...
...security, and performance.
Develop and maintain DataPower services, including XML Firewall, Multi-Protocol Gateway, and Web Service Proxy
Develop and maintain API Gateway policies, including security policies, traffic management policies, and transformation policies...
...experience in designing, developing, and supporting IBM DataPower Gateway X3 appliances
Good experience in implementation of Web Service Proxy, Multi-Protocol Gateway, XML Firewall service
Good experience in AAA (authentication, authorization, auditing) and Customization...
...on experience with scalability technologies like Memcached, Hadoop, Hive, Pig,Solr, Lucene, Sphinx, Kafka and understanding of web proxies and caching technologies like Varnish, Squid and relative load balancing technologies.
• Familiar with configuration management and...
...team meetings
Ensure a strong, candid team dynamic with productive, professional dialogue
Be a strategic adviser, confidant and proxy for the VP of Global Support
Clarify and oversee connection points and initiatives across departments
Optimise processes by...
...operational best practices
Operate and monitor security tools such as Antivirus, VA scan, WAF, PAM, DNS, Certificate, Firewall and Proxy
Manage and support security requests and incidents through ITSM
Manage security operations, perform problem and root cause...
...environment and lead all agile ceremonies.
Build and maintain good strong relationships with clients and stakeholders and act as a proxy for the client to the development teams.
Manage the product development life cycle of define / build / release / measure end-to-...
...CORE COMPETENCIES
Active Directory, Exchange 2016, Exchange 2019, Office 365, Azure AD,
Office 365, Microsoft Intune / EMS, Online Protection, DLP, Information Protection Suite, Azure MFA Server, Azure AD Sync, ADFS Proxy & Windows Azure application and services....
...experience selling network infrastructure-based security appliances, including but not limited to: Firewalls, SSL/IPSec VPNs, Security Proxies and Caches • Familiarity working with Channel partners and understanding of a channel-centric market approach • Previous work in...
...of maintaining a secure enterprise network through configuring and managing typical Security Enforcing Devices, such as Firewalls, Proxies, IDS/IPS devices, HIDS/EPO. Knowledge of Sourcefire/Snort Prior experience automating interactions between systems using APIs Industry...
...Experience Must
-Solid understanding of Object-Oriented Design Methodology and Design Patterns like Singleton, Factory, Observer, Proxy, Demand,
-Expertise in Core Java concepts, such as OOP Design, Multi-Threading, Generics, Exception Handling, Collections, Java...
...Organize and support the annual Long-Range Planning (LRP) efforts. Drive outcomes and initiatives, leveraging partners from other BUs.
Proxy as CIO in key leadership meetings, while providing leadership and direction on key initiatives.
Optimize IT cadence to ensure...
...Administration of VPN both user and tunnels
Trouble shooting network related problems
Maintenance and Administration of corporate proxy
Maintenance and Administration of Trend Micro Office Scan
Maintenance and Administration of Data Leakage Prevention (DLP)...
...processes & procedures and provide instructions to subordinates to ensure their proper implementation.
Others:.
19. Act as a proxy for procurement section at various meetings with internal NAKILAT departments JV partners and affiliates as well as external partners...
...that understanding both in written and verbal forms .
Displays familiarity with detail of web application protocols ( - including proxying and cookies - SSL, SOAP etc).
Logging and reporting.
F5 BIG-IP Local Traffic Manager (LTM).
F5 BIG-IP Global Traffic...
...Administration of VPN both user and tunnels
Trouble shooting network related problems
Maintenance and Administration of corporate proxy
Maintenance and Administration of Trend Micro Office Scan
Maintenance and Administration of Data Leakage Prevention (DLP)...
...solutions, IDS/IPS, anti- virus technologies, SIEM technologies, host forensics and malware analysis, web application firewalls and proxy solutions.
Manage real time threat detection technologies to identify and quarantine threats, Monitor Endpoint Security; alerts and...