Perfetti Van Melle - one of the world&039;s largest manufacturers and distributors of confectionery and chewing gum with global brands that are being enjoyed in more than 150 countries worldwide - is seeking for a passionate and enthusiastic IT Specialist.
WHAT YOU WILL DO
• Installation of new hardware/software. Monitors the operation of computer hardware and software; configures hardware and software to meet departments&039; needs
• Network operations, monitoring, and maintaining network components
• Must have the ability to implement the information system security procedures necessary to protect system control and network management data. keep the enterprise network safe and secure.
• Monitoring the function of the Storage Area Networks (Windows/UNIX/Linux/etc.)
• Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations. Install, update and upgrade hardware/ software systems; troubleshoot the operating systems and standard applications.
• Proactively manage system information security architecture, design, operational planning, and risk remediation activities
• Responds to users as helpdesk. Instructs computer system users in the use of computer equipment and of computer applications; answers question and assists in resolving problems regarding the methods and procedures for using computer applications.
• Conducts risk assessment and provide recommendations for enhanced security architecture and infrastructure for security operation
• Train people in computer system use, Training employees on information security. Produce related documentations of IT PVN and prepare training IT skills
• Developing and maintaining internet or intranet web sites. Establishes and maintains Internet and Intranet web sites and web pages. PHP, MySQL, SQL 2012, SQL 2016
• Evaluate and conduct Continuity of Operations (COOP) and Disaster Recovery (DR) operations in plans and guidelines.
• Setting up entire security programs, monitoring information networks for breaches and gathering data to be used in the prosecution of cyber criminals.
• Develop and enhance system security documentation including rules of behavior, continuity of operations and disaster recovery, interconnection agreements, and incident response plans.
Develop and manage required system compliance reports and information requests.
• Maintaining and Developing written Network Policies, and the enforcement and/or use of those policies