...reference to the SOP.
Upon failure, troubleshoot, re-activate and re-schedule scanning.
Escalate issues beyond level , to the Security Engineer for follow-ups, upon detection of security vulnerabilities.
Track patch management activities on a daily basis....
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...Infrastructure Management:
Design, deploy, and maintain scalable, secure, and highly available infrastructure on AWS using services such... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of...
...Android development, ensuring adherence to quality, performance, and security standards.
Conduct code reviews, provide feedback, and... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...metrics and making recommendations for improvement.
Data Visualization
Creating visualizations and reports to communicate findings and insights to stakeholders.
Utilizing tools such as Tableau to create compelling data visualizations.
Requirements...
...required
Liaise with line manager all issues adversely affecting the customer or an office or Agent.
Be proactive, by planning and finding alternative solutions to enhance our customer’s needs and to improve competitiveness and profitability.
Develop, maintain & ensure...
...emphasis on cybersecurity.
# System and Cybersecurity Management: Oversee the installation, configuration, maintenance, and secure operation of all IT infrastructure including servers, networks, and workstations. Implement robust cybersecurity measures tailored to...
...Management (30%)
Drive revenue growth by identifying opportunities to sell additional services based on the needs of clients
Secure account stability and profitability by ensuring client happiness in a business-sustainable manner
Develop best practices,...
...the health of Hadoop clusters, addressing performance issues and ensuring optimal resource utilization.
Implement and maintain security protocols within the Hadoop ecosystem, including authentication, authorization, and encryption.
Develop and implement backup and...
...About Us
When you work with us, you’ll find that we deliver results; without compromising on respect. We value each other’s differences while recognising individual strength.
We are the world’s leading contract logistics company. We create competitive advantage for our...
...About Us
When you work with us, you’ll find that we deliver results; without compromising on respect. We value each other’s differences while recognizing individual strength.
We are the world’s leading contract logistics company. We create competitive advantage for our...
...peripheral devices.
Provide 1st level on-site IT support to the end-users on 8 hours shift including Public Holidays.
Provide findings and timely status update to the Project Manager on major issues escalated by users.
Perform daily health check and inventory...
2500 SGD
...to diagnose and recommend solutions for technical issues promptly. Respond and coordinate system fault recovery activities and cyber security incidents;
• Deploy, manage and maintain software and database;
• Apply patches, upgrades and configuration or other procedures as...
...of our products & services.
● Ensure the physical availability of our products (store and online stock, orders, etc.).
● Ensure security for me and my customers (store, products and data security).
Benefits
💰 A remuneration That Grows With You:
Kick off with...
1800 SGD
...person will need to assist in programmes and help to manage volunteers. Other duties include performing housekeeping duties and to ensure security and safety.
KEY DUTIES AND RESPONSIBILITIES
1. Attending to the needs of residents
a) Receive new admissions - allocate room,...
...daily tasks (mount, unmount, silo eject, etc.)
• Use of Hewlett Packard Enterprise tools and processes related to Media
Physical Security Activities
• Processing of the Data Centre Access Request
• The data center is manned by security personnel (MAT) on a 24 x 7...
...ensure timely payments
Maintain accurate and up-to-date for all fee payments such as adhoc payments
Prepare Welcome Guide and Security Passes
Attend to enquiries (walk in, phone calls, email) from parents, professionals and the general public on Early...