complex technology audits focused on cloud environments (especially AWS), cybersecurity programs, network security, and enterprise applications. Evaluate cloud infrastructure controls, architecture risks, and configuration management within AWS environments, identifying gaps and control weaknesses. Conduct assessments of cybersecurity frameworks, including access management, vulnerabilitymanagement, incident response, and More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response, as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team More ❯
AVP Cryptography PKI Engineer, you should have experience with: PKI (Public Key Infrastructure), including setting up and managing digital certificates and certificate authorities. Certificate Management platforms such as Venafi or Keyfactor. HSMs (Hardware Security Modules) like Thales or Entrust for secure key storage. Additional valued skills include: Proficiency in … ensure compliance with standards. Develop training materials and contribute to technical documentation on cryptography. Manage and support cryptography services, including incident, problem, change, and vulnerability management. Understand cryptographic principles and advocate for security improvements. Present complex ideas effectively to diverse audiences. Assistant Vice President Expectations Contribute to decision-making More ❯