Key Responsibilities:
Collaborate in the redesign of the on-premise infrastructure architecture, transitioning it to a Cloud-friendly structure compatible with the ERP solution. This includes designing high availability, disaster recovery, data protection, monitoring, and migration approaches.
Configure network setups to ensure secure access and seamless information flow across the ERP system and its integration components.
Conduct content monitoring and filtering for firewalls, intrusion prevention, network authentication, remote access, and enterprise anti-virus solutions, adhering to cybersecurity standards.
Ensure compliance with architecture directions and standards across the ERP system and its integrating components, under the guidance of the Architect - Network and Security.
Partner with the Network and Cyber Security Teams to establish network security and performance monitoring mechanisms and reporting systems for the ERP system and its integrating components.
Collaborate with the Cyber Security Architect to design incident and emergency response guidelines/systems to mitigate events leading to system breakdown, such as hacking, system errors, or performance issues.
Create comprehensive documentation for all security products and measures implemented within the ERP project.
Integrate the new ERP system with the operation service management processes.
Requirements:
Hold a recognized university degree in Information Technology, Computer Science, or an equivalent field.
Possess a minimum of 4-6 years of relevant experience in a similar role.
Demonstrate a strong understanding of IT infrastructure technologies, including operating systems, databases, and network technologies, with a preference for experience in cloud infrastructure.
Prior experience in cloud ERP or cloud project implementation is highly preferred.
Proficiency in network Denial of Service (DoS) defense, avoidance, and protection strategies.
Experience with Agile ways of working and/or cross-functional technical solution delivery.
Hands-on experience with cloud implementation is highly desirable.
Familiarity with the deployment of Identity and Access Management (IAM), audit monitoring, network, encryption, and security controls in cloud solutions is an advantage.
Strong problem-solving skills, adaptability, self-motivation, and the ability to excel under pressure.
Excellent interpersonal and communication skills with a keen eye for detail.
A commitment to continuous learning and a proactive, performance-driven, and results-oriented approach.