Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
Description
1- MS D365 CRM
2- MS power automate development
3- MS Power App development
IT Infrastructure Security
Plan, develop, update, and implement corporate information security standards & guidelines encompassing data, physical & intellectual security in order to secure the integrity of both IT and OT (Plants) systems.
Perform risk analysis to identify any security issues that could lead to loss of data or unavailability of service.
Perform penetration testing and vulnerability scanning on periodic basis to identify and patch vulnerable systems.
Monitor and identify any unauthorized or suspicious behavior in the traffic (internal and external) and notify concerned function head to ensure data safety and integrity.
Provide technical guidance and training to IT users and design and implement programs for user awareness, compliance monitoring and security compliance to ensure organization-wide awareness of the importance of securing the network.
Coordinate disaster recovery and business continuation planning to ensure back up plans are in place in case of any emergencies and data integrity and reliability are protected at all times.
Implement, upgrade, repair, and modify or replace information security devices or software to ensure secure access to enterprise files and data elements.
Additional IT Help Desk Operations
Carry out IT help desk work within the department procedures to ensure consistency of service to users.
Support users in the use of computer equipment by the provision of advice, training, and solutions to their problems, escalating the problem to the relevant authority when the answer is not readily available.
Provides proactive and reactive end user support and remote support to immediately resolve any end user problems.
Answer and log calls from IT users to gain an understanding of their software application problems and properly issue work tickets for easy identification of problem.
Coordinate with vendors for various tasks such as maintenance of software and hardware devices.
Install and configure computer hardware operating systems and applications.
Set up hardware devices for new employees.
In case of a leaving employee and on request of HR deregister employee and collect all hardware and other items issued to him/her.
Diagnose and solve hardware/software faults according to assigned priority.
Handle procurement tasks including solution analysis, product research, vendor communication and documentation.
Policies, Systems, Processes & Procedures
Follow all relevant departmental policies, processes, standard operating procedures, and instructions so that work is carried out in a controlled and consistent manner.
Continuous Improvement
Contribute to the identification of opportunities for continuous improvement and sustainability of systems, processes and practices considering global standards, productivity improvement and cost reduction.
Reporting
Assist in the preparation of timely and accurate statements and reports to meet department requirements, policies, and quality standards.
Proactively protect the integrity, confidentiality, and availability of information in the custody of, or processed by, the company, providing regular reports to superiors regarding the effectiveness of network and data security and making recommendations for the adoption of new procedures and technologies as required.
Related Assignments
The job holder may be required to undertake additional duties, which may be reasonably expected and forms part of the function of the job.
7. QUALIFICATIONS, EXPERIENCE & SKILLS
Minimum Qualifications:
Bachelor’s degree in Computer Science, Computer Engineering, or a related field
Master’s degree in Cybersecurity is preferrable
Up-to-date Global Industrial Cyber Security Professional (GICSP) certification is preferrable
Minimum Experience:
3 years of relevant experience in a similar role
Job-Specific Skills (Generic / Technical):
Proficiency in English
Relevant security certifications
Good communication and inter-personal skills
Good knowledge and understanding of business and business processes
Knowledge of vulnerability scanning, firewalls, IDS/IPS, malwares, networking, and encryption protocols
Familiarity with ICS (Industrial Control System) security and SCADA systems
Interested candidates may share their updated resume with the subject line to : [email protected]
You'll no longer be considered for this role and your application will be removed from the employer's inbox.