Views:73
Applicants:4
Posted on 16 Jun, 2025
Follow all information security policies, procedures, and guidelines.
Attend training and apply best practices while handling data.
Report any suspected breaches or security issues to the InfoSec team or CISO.
Develop and optimize ETL (Extract, Transform, Load) processes
Comply with role-specific security responsibilities as assigned.