maintaining, and optimising network infrastructure to ensure efficient and secure communication. This role a critical role in ensuring network reliability, performance, and security.
Key Roles and
end point solutions, Network Access Control solutions, DNS clusters, Cloud security, mail and domain protection
IPS, DNS, Mail gateways, Network
health checks for various products (i.e., network, security, etc.)
functionality. Disaster Recovery Backups Internal Network Security Network Environment End-User Support QUALIFICATIONS
communications.
and development. You will have strong networking and security and ideally voice technology experience unified communications. Strong understanding of network security principles and best practices, including firewall Diagnose and resolve network connectivity issues, performance problems, and security vulnerabilities promptly
infrastructure analyst Server, Storage, Networking, and Security. You have MCSA or MCSE MS-900.
You must have network security experience, IT security methodology
problems.
Respond to all system and/or network security breaches.
Plan, implement, monitor, and
systems, and other security appliances for network security. Design and implement secure network architectures Configure and maintain Virtual Private Networks (VPNs) for secure remote access. Harden network infrastructure Scripting and Automation (e.g., Python). Network Forensics. Wireless Security. Behaviours: Effectively works with systems, and other security appliances for network security. Design and implement secure network architectures Configure and maintain Virtual Private Networks (VPNs) for secure remote access. Harden network infrastructure
systems, and other security appliances for network security. Design and implement secure network architectures Configure and maintain Virtual Private Networks (VPNs) for secure remote access. Harden network infrastructure Scripting and Automation (e.g., Python). Network Forensics. Wireless Security. Behaviours: Effectively works with systems, and other security appliances for network security. Design and implement secure network architectures Configure and maintain Virtual Private Networks (VPNs) for secure remote access. Harden network infrastructure