Search Results: 35 vacancies
...their proper implementation to support achieving the different set targets and plans, hence Nakilat strategy.
Others:
24. Act as a proxy for the company at various industry forums as well as other working groups and committees of charterers, operators, joint owners,...
...security, and performance.
Develop and maintain DataPower services, including XML Firewall, Multi-Protocol Gateway, and Web Service Proxy
Develop and maintain API Gateway policies, including security policies, traffic management policies, and transformation policies...
...processes and procedures, and provide instructions to subordinates to ensure their proper implementation.
Others:
27. Act as the proxy of the company at various industry forums as may be required.
28. Monitor and analyze guarantee claims and recommend on response....
...Office 365, Microsoft Intune / EMS, Online Protection, DLP, Information Protection Suite, Azure MFA Server, Azure AD Sync, ADFS, ADFS Proxy & Windows Azure application and services.
• Expert in Microsoft Teams.
• Develop & Executes PowerShell or Command Shell commands...
...Computer Science
12 years experience in designing and implementing security technologies (Cisco ASA firewalls Juniper Blue Coat proxies IPS ISA and McAfee)
5 years in ICT security in the financial sector
Deep understanding of network security
Experience in Windows...
...on experience with scalability technologies like Memcached, Hadoop, Hive, Pig,Solr, Lucene, Sphinx, Kafka and understanding of web proxies and caching technologies like Varnish, Squid and relative load balancing technologies.
• Familiar with configuration management and...
...experience in designing, developing, and supporting IBM DataPower Gateway X3 appliances
Good experience in implementation of Web Service Proxy, Multi-Protocol Gateway, XML Firewall service
Good experience in AAA (authentication, authorization, auditing) and Customization...
...Azure Sentinel, and monitoring tools, configuration management tools, host virtualisation, containerisation, vulnerability scanners, proxies, WAFs
• Strong technical skills with experience in intrusion analysis and investigation using a variety of security tools (SIEM,...
...· Office 365, Microsoft Intune / EMS, Online Protection, DLP, Information Protection Suite, Azure MFA Server, Azure AD Sync, ADFS Proxy & Windows Azure application and services.
· Active Directory, Group Policies, IIS, Microsoft PKI Certificates, PowerShell, Scripting...
...nice to have)Good working knowledge of: Server platforms (UNIX, Windows etc.), networking technologies, security (Firewalls, IDS IPS, proxy systems etc.), storage devices. • Good understanding of System Development Life cycle, REGular Expression (REGEX), PERL, Python. •...
...DUTIES AND RESPONSIBILITIES: Monitoring various IT & Information security tools such as SIEM Cyber defence system DLP Proxy Email Gateway Application Control Advanced threat protection tools Antivirus systems etc to ensure that Information security is not compromised...
...environment and lead all agile ceremonies.
Build and maintain good strong relationships with clients and stakeholders and act as a proxy for the client to the development teams.
Manage the product development life cycle of define / build / release / measure end-to-...
...team meetings
Ensure a strong, candid team dynamic with productive, professional dialogue
Be a strategic adviser, confidant and proxy for the VP of Global Support
Clarify and oversee connection points and initiatives across departments
Optimise processes by...
...operational best practices
Operate and monitor security tools such as Antivirus, VA scan, WAF, PAM, DNS, Certificate, Firewall and Proxy
Manage and support security requests and incidents through ITSM
Manage security operations, perform problem and root cause...
...Organize and support the annual Long-Range Planning (LRP) efforts. Drive outcomes and initiatives, leveraging partners from other BUs.
Proxy as CIO in key leadership meetings, while providing leadership and direction on key initiatives.
Optimize IT cadence to ensure...
...Administration of VPN both user and tunnels
Trouble shooting network related problems
Maintenance and Administration of corporate proxy
Maintenance and Administration of Trend Micro Office Scan
Maintenance and Administration of Data Leakage Prevention (DLP)...
...Implementing client and patient workflows into tech platforms spanning a variety of verticals
Data entry and integrity
Acting as a proxy for the Customer Success and Implementation manager on various meetings and workflows such as legal, customer success, and...
...experience selling network infrastructure-based security appliances, including but not limited to: Firewalls, SSL/IPSec VPNs, Security Proxies and Caches • Familiarity working with Channel partners and understanding of a channel-centric market approach • Previous work in...
...experience selling network infrastructure-based security appliances, including but not limited to: Firewalls, SSL/IPSec VPNs, Security Proxies and Caches • Familiarity working with Channel partners and understanding of a channel-centric market approach • Previous work in...
...of maintaining a secure enterprise network through configuring and managing typical Security Enforcing Devices, such as Firewalls, Proxies, IDS/IPS devices, HIDS/EPO. Knowledge of Sourcefire/Snort Prior experience automating interactions between systems using APIs Industry...