Contribute to cyber security threat assessments Submitted by Ruchi.Makkar@e… on Tue, 02/06/2024 - 14:51 Read more about Contribute to cyber security threat assessments Contribute to cyber security threat assessments
Gather, analyse and interpret threat data Submitted by Ruchi.Makkar@e… on Tue, 02/06/2024 - 14:50 Read more about Gather, analyse and interpret threat data Gather, analyse and interpret threat data
Gather, analyse and verify data from different source inputs Submitted by Ruchi.Makkar@e… on Tue, 02/06/2024 - 14:47 Read more about Gather, analyse and verify data from different source inputs Gather, analyse and verify data from different source inputs
Model data processes Submitted by Ruchi.Makkar@e… on Tue, 02/06/2024 - 14:46 Read more about Model data processes Model data processes
Use network tools Submitted by Ruchi.Makkar@e… on Tue, 02/06/2024 - 14:44 Read more about Use network tools Use network tools
Manage project quality Submitted by Ruchi.Makkar@e… on Tue, 02/06/2024 - 14:40 Read more about Manage project quality Manage project quality
Manage client problems Submitted by Ruchi.Makkar@e… on Mon, 02/05/2024 - 19:23 Read more about Manage client problems Manage client problems
Match ICT needs with the strategic direction of the organisation Submitted by Ruchi.Makkar@e… on Mon, 02/05/2024 - 19:22 Read more about Match ICT needs with the strategic direction of the organisation Match ICT needs with the strategic direction of the organisation
Originate and develop concepts Submitted by Ruchi.Makkar@e… on Mon, 02/05/2024 - 19:15 Read more about Originate and develop concepts Originate and develop concepts
Lead and facilitate a team Submitted by Ruchi.Makkar@e… on Mon, 02/05/2024 - 19:13 Read more about Lead and facilitate a team Lead and facilitate a team