5 Job openings found

1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
Job Description: We are seeking a skilled and motivated Information Security Analyst 1 with 3 to 4 years of experience to join our team. The ideal candidate will have hands-on experience with Active Directory (AD) and Privileged Access Management (PAM) systems. This role involves ensuring the security and integrity of our ...
1 Opening(s)
4.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Key Responsibilities: Technical Skill and Support:o Install, configure, and maintain Windows Server operating systems, includingWindows Server 2016/2019/2022 & Linux.o Strong technical background working with modern server tools andtechnology such as VMware/ Nutanix/PAM/Office 365o Manage user accounts, permissions, and access rights in Active Directoryo Monitor and maintain system performance, security, and ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Responsibilities: Assist in the design and implementation of BeyondTrust Privilege Remote Access. Work with stakeholders to identify requirements and convert those requirements intoBeyondTrust Privilege Remote Access configurations. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure ...
1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Lead the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively with ...
1 Opening(s)
5.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Assist in the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile