Planning, design and implementing of server configuration routing protocols, network configurations, storage, backup and statistical analysis are in your everyday vocabulary.
Firewalls, ITIL, cyber security and risk mitigation are the first and last things you think about each day. You live and sleep this environment.
Your impeccable approach and record of minimising downtime is remarkable. Above all, you have a nose for identifying and scoping IT infrastructure and delivering outstanding solutions, especially as it applies to cyber security.
When it comes to large scale and complex application of hardware and software, youre the best-of-the-best.
Thank you for reporting this job!
Your feedback will help us improve the quality of our services.