The position is responsible for maintaining and safeguarding the IT infrastructure of the organization, which includes computer networks, cloud, end user devices, servers, and bespoke applications. Using industry frameworks and standards plan and carry out IT infrastructure and Security measures to ensure all systems are up to date, operating withing parameters and monitor and protect sensitive data and systems from infiltratio[ "RESPONSIBILITIES. Infrastructure:\t. Elicits requirement... more details
job summary: JOB PURPOSE: The position is responsible for maintaining and safeguarding the IT infrastructure of the organization, which includes computer networks, cloud, end user devices, servers, and bespoke applications. Using industry frameworks and standards plan and carry out IT infrastructure and Security measures to ensure all systems are up to date, operating withing parameters and monitor and protect sensitive data and systems from infiltratio
[
"
RESPONSIBILITIES
Infrastructure:
\t
Elicits requirements for systems and software life cycle working practices and automation.\t
Prepares design options for the working environment of methods, procedures, techniques, tools, and people. \t
Selects systems and software life cycle working practices for software components and micro-services. \t
Deploys automation to achieve well-engineered and secure outcomes.
Information Security:
\t
Provides guidance on the application and operation of elementary physical, procedural and technical security controls. \t
Explains the purpose of security controls and performs security risk and business impact analysis for medium complexity information systems. \t
Identifies risks that arise from potential technical solution architectures. Designs alternate solutions or countermeasures and ensures they mitigate identified risks. \t
Investigates suspected attacks and supports security incident management.
Security Operations:
\t
Maintains operational security processes and checks that all requests for support are dealt with according to agreed procedures. \t
Provides advice on defining access rights and the application and operation of elementary physical, procedural, and technical security controls.\t
Investigates security breaches in accordance with established procedures and recommends required actions. Provides support and checks that corrective actions are implemented.
Vulnerability Assessment:
\t
Collates and analyses catalogues of information and technology assets for vulnerability assessment. \t
Performs vulnerability assessments and business impact analysis for medium complexity information systems. \t
Contributes to selection and deployment of vulnerability assessment tools and techniques.
Digital Forensics:
\t
Designs and executes complex digital forensic investigations on devices. \t
Specifies requirements for resources and tools to perform investigations. \t
Processes and analyses evidence in line with policy, standards and guidelines and supports the production of forensics findings and reports.
IT Infrastructure:
\t
Provides technical expertise to enable the correct application of operational procedures.\t
Contributes to the planning and implementation of infrastructure maintenance and updates. Implements agreed infrastructure changes and maintenance routines.\t
Uses infrastructure management tools to determine load and performance statistics. Configures tools and/or creates scripts to automate the provisioning, testing and deployment of new and changed infrastructure. Maintains operational procedures and checks that they are executed following agreed standards.\t
Investigates and enables the resolution of operational issues. Provides reports and proposals for improvement, to specialists, users, and managers.
Availability Management:
\t
Analyses service and component availability, reliability, maintainability, and serviceability. \t
Contributes to the availability management process and its operation. Performs defined availability management tasks. \t
Ensures that services and components meet and continue to meet all of their agreed performance targets and service levels. \t
Implements arrangements for disaster recovery and documents recovery procedures. Conducts testing of recovery procedures.
Change Management:
\t
Assesses, analyses, develops, documents, and implements changes based on requests for change. \t
Ensures that operational processes are in place for effective change control. \t
Develops, configures, and maintains tools to manage and report on the lifecycle of change requests. \t
Identifies problems and issues and recommend corrective actions.
Capacity Management:
\t
Monitors service component capacity and initiates actions to resolve any shortfalls according to agreed procedures. \t
Applies techniques to control the demand upon a particular resource or service. \t
Contributes to capacity modelling and planning. \t
Supports the design of service component capacity.
Storage Management:
\t
Prepares and maintains operational procedures for storage management. \t
Monitors capacity, performance, availability, and other operational metrics. Takes appropriate action to ensure corrective and proactive maintenance of storage and backup systems to protect and secure business information. \t
Creates reports and proposals for improvement. \t
Contributes to the planning and implementation of new installations and scheduled maintenance and changes of existing systems.
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
We would like to take a second to Welcome You to Job Abstracts, the nation’s largest Pure Job Board. With over 3.1 million job listings from 15,000+ Companies & Organizations, we help job searchers find careers that match their interests. As an anonymous user, you have probably discovered how easy our system is to use. However, you have just scratched the surface of what we can offer.
We encourage you to Register so you can use our most powerful features: searching with multiple terms, setting up multiple locations, establishing favorite companies, and accessing your search history. If you find a job you like, you can apply directly for it, and then, keep notes on it. We will also keep a lookout for jobs that match your search terms and email you when we find something you may like.
You can register for free and the system is free to use. If you like our system so far, click on Register and unlock the power required by serious job searchers.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.