Consultant for Security Framework of Mobile Applications Service Contract (Advisory Services)
|
|
- Cleopatra Wells
- 8 years ago
- Views:
Transcription
1 Ministry of Communications and Information Technology (MCIT) Islamic Republic of Afghanistan Request for Expressions of Interest for Individual Consultant Consultancy Services: Consultant for Security Framework of Mobile Applications Organization: Project Implementation and Coordination Unit (PICU) Project: ICT Sector Development Project-P121755{IDA Q 7440] Reference No.: PPF/C-8 Position: Contract Type: Duration: Duty station: Consultant for Security Framework of Mobile Applications Service Contract (Advisory Services) 3 months Kabul The Ministry of Communications and Information Technology (MCIT) of the Government of Afghanistan ( Government ) seeks to hire a qualified individual consultant ( Consultant ) to design and specify Network Security framework for the Mobile Applications that will be hosted at the Afghanistan National Data Center. Background The Government has requested funding from the International Development Association (IDA) of the World Bank Group for an ICT Sector Development Project in Afghanistan. This project, implemented by MCIT, seeks to (1) expand broadband connectivity, (2) mainstream use of mobile applications across the Government, and (3) develop the capacity of the IT sector to facilitate improved service delivery across Afghanistan. The indicative total cost of the project is US$40 million. The project envisages using a shared platform to deploy mobile applications. This will reduce costs and help aggregate demand across the Government. A critical infrastructure that will be part of the platform is the Afghanistan National Data Center (ANDC). The ANDC already provides a backbone for the e- Government program and will now be expanded to include mobile Government (m-government). ANDC is also considered to be a premier and essential component of the Government of Afghanistan in the field of Information Services and information Technology (IT) applications. With the inclusion of m-
2 Government, ANDC will be instrumental in steering ICT applications in Government Organizations on both Central and Provincial level for wider transparency in government functions and improvement in the decentralized planning and management. It will also address the needs of the private sector by providing latest and tailored to the needs technological infrastructure and services. ANDC has been identified as one of the core infrastructure components to consolidate services, applications and infrastructure to provide efficient electronic delivery of G2G, G2C and G2B services. ANDC will act as a mediator and convergence point between open unsecured public domain and sensitive government environment and it will also provide services for government s own access. It will enable various Government organizations to host their m-government services/applications on a common infrastructure leading to ease of integration and efficient management, ensuring that computing resources and the support connectivity infrastructure (WiMAX/Fiber Optic Ring) is adequately and optimally used. These services would be extended to Government agencies, Citizens and Businesses through the connectivity infrastructure being rolled out such as Government Cable Network (GCN) and ANDC to Clients WiMax connectivity. Data Centre would provide many functionalities like Central Repository of the databases for the Government, Secure Data Storage, Online Delivery of Services, Citizen Information/Services Portal, State Intranet Portal, Remote Management and Service Integration. The challenge the ANDC is facing is lack of suitable expertise to run and maintain the data center network infrastructure. Being a highly technical and advanced technological environment a highly skilled, professional and lead technical expert is required to fulfill the urgent and crucial needs of ANDC. This is a mandatory requirement for running the state-of-art facility and providing world class services to the government organizations. OBJECTIVE OF THE ASSIGNMENT The objective of the assignment is to assist ANDC network security department to design the security framework for the mobile applications that will be hosted in the ANDC. SCOPE OF WORK The consultant is expected to conduct the following: Review current IT security measures applicable to mobile applications hosted on the ANDC Supervision of Database Security Procedures Supervision of Data Encryption and Decryption Procedures Development of Data Security Procedures Supervising and observing the hackers and intrusion in the ANDC network Creating security watch dogs at the entrance level of the ANDC networks Troubleshooting, designing and maintaining the ANDC CISCO Network Infrastructure
3 Configuration of Routers, Switches and other devices as necessary Connecting NDC with clients via fiber/wimax network through Afghan Telecom Observing issues like: - Alerts and Warnings, - Incident handling, - Incident analysis, - Incident response on site, - Vulnerability Handling, - Vulnerability analysis, - Vulnerability response - Threats Announcements - Technology watch - Security Audits or Assessments - Development of Security Tools - Security-Related Information Dissemination - Risk Analysis - Security Consulting - Education/Training - Product Evaluation or Certification Designing network expansions and necessary changes and tunings. Maintaining the network and implementing ANDC policies and regulations. Connecting clients and providing access to requested services in an effective manner. Training the subordinates in various network related areas. The entire assignment is scheduled to be completed within 3 months from the date of signing the agreement. The consultant will be provided the following: - Office space, internet access. - Access to the ANDC network and passwords for various devices. - ANDC Network Design, Configuration and other technical documents. - Support to arrange meetings with clients and Afghan Telecom as required.
4 CONSULTANT QUALIFICATIONS AND eexperience At least a Bachelor s degree in Computer Networks or related fields. A Master s degree is preferable. 1. A Master s Degree with at least 3 years of experience or a Bachelor s degree with at least 5 years of experience in network and data securities and 5 years 2. Good understanding of system design and analysis 3. Understanding of international policies and standards in area of networks securities 4. Understating of Cisco platforms 5. Understanding of network security standards 6. Good understanding of computer hardware, server applications and operating systems 7. Understanding of international policies and standards in area of computer networks and hardware 8. A thorough knowledge of English is essential 9. Computer literacy and ability to effectively use office technology equipment, IT tools. 10. Good communication and interpersonal skills INTERESTED AND ELIGIBLE CANDIDATES must provide information indicating that they are qualified to perform the Services and are invited to submit their CV (Curriculum Vitae), including education background, employment records, description of similar assignments, experience in similar conditions, availability of appropriate skills). Expressions of interest must be delivered or sent by to the address below no later than 07 Feb, 2011; AM (Kabul Time). Foreign Procurement Department (FPD) Attn: Mr.Samimullah Samin General Manager for External Procurement Procurement Department, Ministry of Communications and IT (MCIT) Mohammad Jan Khan Watt Kabul, Afghanistan Office: Cell phone: fpd@mcit.gov.af Web site: Copy to: Eng.Baryalai Hassam ; Deputy Minister Technical Ministry of Communication and IT, I.R of Afghanistan Mohammd Jan Khan Watt, Kabul Afghanistan Landline: b.hassam@mcit.gov.af And also to: mi.bhat@mcit.gov.af Any queries on the position may also be addressed to the above mentioned addresses, latest 3 working days before the deadline for submission of applications.
5
THE FRAMEWORK FOR CERTIFICATIONS AND THE STANDARDS OF IT INDUSTRY OF AFGHANISTAN]
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES INDIVIDUAL CONSULTANT TO DESIGN THE FRAMEWORK FOR CERTIFICATIONS AND THE STANDARDS OF IT INDUSTRY OF AFGHANISTAN]
More informationREQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES]
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES] COUNTRY: NAME OF THE PROJECT: SECTOR: CONSULTING SERVICES: CONTRACT TYPE: DURATION OF ASSIGNMENT: DUTY STATION:
More informationMinistry of Communications and Information Technology (MCIT); Islamic Republic of Afghanistan
Ministry of Communications and Information Technology (MCIT); Islamic Republic of Afghanistan BASIC DATA: Request for Expressions of Interest (REOI) and the Terms of Reference (TOR) Individual Consultant
More informationREQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES]
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES] COUNTRY: NAME OF THE PROJECT: SECTOR: CONSULTING SERVICES: CONTRACT TYPE: DURATION OF ASSIGNMENT: DUTY STATION:
More informationREQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES FIRMS SELECTION)
REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES FIRMS SELECTION) Country: Islamic Republic of Afghanistan; Ministry of Communications and IT Name of the Project: Afghanistan ICT Sector Development
More informationVacancy Number: 1021. No. of Post: As AFTEL salary Scale Announcing Date: Oct 2, 2011 Closing Date: Oct 12, 20111. Background:
Apart from the above, Aftel is the only entity that provides Government Communications Network (GCN) which connects over 40 ministries and government offices in Kabul with 34 Provincial Governor s offices,
More informationConsultancy Services: International Consultant E-GIF, ITIL standards and IT Governance Project: E-Government Resource Center (EGRC II)
Ministry of Communication and Information Technology (MCIT) Islamic Republic of Afghanistan Request for Expressions of Interest for Individual Consultant Consultancy Services: International Consultant
More informationOutput Indicator(s) Revised ICT policy adopted by the Government of Islamic Republic of Afghanistan
Ministry of Communications and Information Technology (MCIT); Islamic Republic of Afghanistan Terms of Reference Development of plan for efficient Utilization of Telecom Development Fund for Tele-medicine
More informationADMINISTRATIVE STAFF:
MAKERERE P.O. Box 7062 Kampala Uganda Cables MAKUNIKA UNIVERSITY Telephone: 256-41-530295/531410 E.mail: hrd@admin.mak.ac.ug DIRECTORATE OF HUMAN RESOURCES OFFICE OF THE DIRECTOR EMPLOYMENT OPPORTUNITIES
More informationGuidelines for Infrastructure & Application Hosting in SDC
Guidelines for Infrastructure & Application Hosting in SDC V 1.0 Department of Electronics & Information Technology, Ministry of Communications and Information Technology, Government of India Abstract
More informationGuidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1
More informationComputer Technical Assistant
U.S. Embassy VACANCY ANNOUNCEMENT Computer Technical Assistant CLOSING DATE FOR THIS POSITION: Wednesday, April 21, 2014; 16:00 Juba Time ANNOUNCEMENT NUMBER: Juba-2014-MGT-04 OPEN TO: All Interested Candidates
More informationMinistry of Information and Communication Technology EXPRESSION OF INTEREST
EXPRESSION OF INTEREST Consultancy Services for SubmarineFibre Optic Connectivity in Rodrigues (Authorised under Section 24(2) of the Public Procurement Act 2006) Reference No. : MICT/Q3/2012/EOI 1.0 Introduction
More information1. BACKGROUND. Terms of Reference. Background
GOVERNMENT OF SAINT VINCENT AND THE GRENADINES Caribbean Regional Communications Infrastructure Project TERMS OF REFERENCE FOR CONSULTING SERVICES For the Design of a National Broadband Network SVG CARCIP
More informationPREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
More informationREPUBLIC OF LIBERIA OFFICE OF MINISTER OF STATE WITHOUT PORTFOLIO. DIASPORA AFFAIRS DEPARTMENT DIASPORA ENEGAGEMENT PROJECT (DEP) Grant No: P124809
REPUBLIC OF LIBERIA OFFICE OF MINISTER OF STATE WITHOUT PORTFOLIO DIASPORA AFFAIRS DEPARTMENT DIASPORA ENEGAGEMENT PROJECT (DEP) Grant No: P124809 CONSULTANT SERVICES: WEB DESIGNER/MANAGER Request for
More informationRequest for Expressions of Interest IT System Consultant
Election Commission Secretariat Preparation of Electoral Roll with Photographs and Facilitating the Issuance of National Identity Card Project Islamic Foundation Building Agargaon, Dhaka. No. PERP&FINIDC/Ops/048/2011/2608
More informationSERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
More informationShort Term Consultancy for Regional Database Expert for Implementation of IGAD Biodiversity Common Database.
Project: Biodiversity Management Programme: EDF/2012/23700 Subject: Short Term Consultancy for Regional Database Expert for Implementation of IGAD Biodiversity Common Database. Closing date : August 12,
More informationCYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,
More informationMINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE
MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE IT SYSTEMS COMPLIANCE AND QUALITY ASSURANCE SPECIALIST
More informationInformation Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
More informationProject title (in Chinese) 項 目
II Project Information Project title (in English) Project title (in Chinese) HKCAAVQ IT Infrastructure Development 香 港 學 術 及 職 業 資 歷 評 審 局 資 訊 系 統 基 建 發 展 Project 項 目 Project summary (Please provide an
More informationRequest for Proposals. Security Advisory Services for the International Executive Service Corps
Request for Proposals Proposal Title: Bid Reference Number: Security Advisory Services for the International Executive Service Corps IESC Security Advisory Services Issue Date: January 21, 2015 Closing
More informationCisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationTERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
More informationJob Opportunity: ICT Manager CDEMA Coordinating Unit CDEMA-CU/CDM-HIP/07. Bridgetown, Barbados
Job Opportunity: ICT Manager CDEMA Coordinating Unit Competition Reference No. CDEMA-CU/CDM-HIP/07 Application Deadline Date February 21, 2012 Location Organization Bridgetown, Barbados Caribbean Disaster
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationComputer Cell (Information & Communication Technology) Research Center
Computer Cell (Information & Communication Technology) Research Center Post* (01) Deputy Manager IT 4 Year Bachelors or Masters of design, Commissioning and maintenance of Local and Wide Area Networks
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationSTAFF VACANCIES Ref. 1527TAAST4
2 October 2015 STAFF VACANCIES Ref. 1527TAAST4 The European Insurance and Occupational Pensions Authority (EIOPA) is currently inviting applications for a position as IT Specialist for its Headquarters
More informationSENIOR LECTURER IN EARLY CHILDHOOD DEVELOPMENT. Requirements
Daystar University is a chartered interdenominational and evangelical Christian University. Its mission is the development of Christian Servant Leaders for the expansion of God s kingdom in Africa and
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationTCIL/16/12/07/2015(WI) 22 nd July 2015. NIT for Pre-bid Tie-up for Disaster Management EoI
TCIL/16/12/07/2015(WI) 22 nd July 2015 NIT for Pre-bid Tie-up for Disaster Management EoI Telecommunications Consultants India Ltd., (TCIL), is a Government of India Enterprise under Ministry of Communications,
More informationUniversity of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
More informationHI-TECH CO. SYSTEMS. Company Profile
HI-TECH CO. SYSTEMS Company Profile About Us HTCS is one of the fast-track high-end networking and service support companies based in Delhi. Our field of specialization includes Hardware procurement, AMC
More informationAPPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationGet what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
More informationSecure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
More informationClassification: Computer Information Technology Specialist II (CITS II) Information Security Unit Title Code: V08005 Pay Range: 33
Classification: Computer Information Technology Specialist II (CITS II) Information Security Unit Pay Range: 33 POSITION SUMMARY: The position provides professional and advanced technical expertise as
More informationVACANCY NOTICE F4E/TA/AD6/2009/0092 (Temporary Agent AD6) NETWORK AND SECURITY ADMINISTRATOR (F/M) AD6
POSITION TITLE VACANCY NOTICE F4E/TA/AD6/2009/0092 (Temporary Agent AD6) NETWORK AND SECURITY ADMINISTRATOR (F/M) AD6 GRADE LOCATION BARCELONA, SPAIN CLOSING DATE FOR APPLICATIONS 27/02/2009 1. THE ORGANISATION
More informationEstablishment of the EARMA Academy:
Establishment of the EARMA Academy: Part 1: EARMA Academy Feasibility Study Brussels: 3 September 2015 The EARMA General Assembly (GA), held at Leiden in June 2015, mandated the EARMA Board to establish
More informationSTATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE MASTER IT PROFESSIONAL II 43 B 7.909 SERIES CONCEPT Master Information Technology
More informationCisco Unified MobilityManager Version 1.2
Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.1, Release 1.2 The Cisco Unified Communications system of voice and IP communications products and applications enables
More informationICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
More informationUniversity of Central Florida Class Specification Administrative and Professional. Network Operations Manager (Enterprise)
Network Operations Manager (Enterprise) Job Code: 2552 Manage enterprise networks. Oversee the monitoring, testing, and trouble shooting of all network components (network software and hardware and network
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationTo establish a single channel for public procurement contracts.
EXPRESSION OF INTEREST (EOI) FOR RECRUITEMENT OF E-PROCUREMENT APPLICATION MANAGER CONSULTANT (X3) 1.0 Background The Government of Rwanda (GoR) wishes to capitalize on employing the use of the most advanced
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationTEMPORARY JOB OPENING ANNOUNCEMENT
UNITED NATIONS NATIONS UNIES Ref. No.: NA-15-08 TEMPORARY JOB OPENING ANNOUNCEMENT P3 Information Systems Officer TJO Grade Level 1 Functional Title UNEP/OFO Department/Office/Division/ Service/Section
More informationPolicy Brief. Public e-procurement at the local level in Albania. Challenges in the fight against corruption. Mona Xhexhaj
Policy Brief Public e-procurement at the local level in Albania Challenges in the fight against corruption Mona Xhexhaj This policy brief has been prepared in the frame of the TRAIN Programme 2014 (Think
More informationData Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
More informationCLOUD MANAGED SERVICES FRAMEWORK E-BOOK
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK TABLE OF CONTENTS 1 Introduction 2 2 Operational Insight 3 3 Cloud Management Process Control 4 4 Infrastructure, Application & Data Security 5 5 Continuous Improvement
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationTERMS OF REFERENCE Consultancy to develop a Strategic Plan for the Sri Lanka Institute of Development Administration (SLIDA)
TERMS OF REFERENCE Consultancy to develop a Strategic Plan for the Sri Lanka Institute of Development Administration (SLIDA) 1. Background The Sri Lanka Institute of Development Administration (SLIDA),
More informationCentral Information Systems Division ICT Manual
Central Information Systems Division ICT Manual May 2015 1 Table of Contents 1. Introduction... 2 2. Structure of CISD... 3 2.1 Technical Staff... 3 2.1.1 Analyst Cadre... 3 2.1.2 Operations Cadre... 4
More informationOVERVIEW. GDC is - Your Best Connection
OVERVIEW General DataComm (GDC) has over 35 years of field-proven experience in the successful deployment and maintenance of voice and data networking equipment. GDC is highly skilled in all aspects of
More informationProject Management Specialist (Health) Type of vacancy:
Solicitation is open to: Position Title: Type of vacancy: Afghan Nationals ONLY Project Management Specialist (Health) Single Opening date: June 18, 2014 Closing date: July 09, 2014 Vacancy announcement
More informationhttps://sjobs.brassring.com/11033/asp/tg/cim_jobdetail_preview.asp?partnerid=25082&si...
Page 1 of 5 Close Bulletin Number 2919BR Type of Recruitment Open Competitive Job Opportunity Human Resources Countywide Exams Position Title SENIOR NETWORK SYSTEMS ADMINISTRATOR Rebulletin THIS ANNOUNCEMENT
More informationU SAID BENIN. TO: FROM: Subject: Date: USAID/Benin is accepting applications for the following position: POSITION TITLE: NUMBER OF POSITIONS: GRADE:
U SAID BENIN FROM THE AMERICAN PEOPLE TO: FROM: Subject: Date: All qualified Applicants Clemencia Acacha Bonou, Supervisory Executive Specialis Job Opportunity Announcement Solicitation #: 680-14-007 April
More informationTransformation Service Customer Services Advert text for vacancy for Desktop Manager
Transformation Service Customer Services Advert text for vacancy for Desktop Manager Information and Communication Technology (ICT) is delivered through the Transformation Services Division as a central
More informationTimor- Leste. United Nations Development Programme. Vacancy Announcement
United Nations Development Programme Timor- Leste Vacancy Announcement Project Title: Strengthening Capacities for Disaster Risk Management in Timor Leste Post Title: National Administration and Finance
More informationHardware. Maintenance
Government Services available through the portal 1. The scope of the work is limited to the portal and its integration with service provider applications. It doesn't include any work on the service provider
More informationGovernment of Nepal. Strengthening Regional Cooperation for Wildlife Protection in Asia Project. IDA Grant No.: H 6660. Terms of Reference
Government of Nepal Strengthening Regional Cooperation for Wildlife Protection in Asia Project IDA Grant No.: H 6660 Terms of Reference Consulting Services for Website development of DNPWC and SAWEN (Contract
More informationGMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please
More information.:::::::::::..:...:. ::::: f~~).t BAKHT AR .. :::.' ~. ~, INSTITUTE OF HIGHER EDUCATION .:::::::::::. '1'''' MASTER DEGREE PROGRAM.
..:..-.:::::::::::..:...:. ::::: f~~).t BAKHT AR.. :::.' ~. ~, INSTITUTE OF HIGHER EDUCATION.:::::::::::. '1'''' MASTER DEGREE PROGRAM MBAlkMCS Bakhtar Institute of Higher Education Introduction: Considering
More informationVilliers High School ICT Department Job Description
Villiers High School ICT Department Job Description Position Title: Responsible To: Salary: IT Manager Head of ICT (Curriculum) TBC General Function The IT Manager is responsible for ensuring the school
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationApplications are invited for the above Contract Agent post at the European Centre for Disease Prevention and Control (ECDC).
European Centre for Disease Prevention and Control Vacancy for the post Human Resources Specialist in the Resources Management and Coordination Unit (ECDC/CA/FGIII/2015/RMC-HRS) Applications are invited
More informationEgyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
More informationICTTEN5204A Produce technical solutions from business specifications
ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor
More informationHow To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
More informationCurrent IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
More informationIslamic Relief Worldwide ICT Desktop Support Technician
Islamic Relief Worldwide ICT Desktop Support Technician BASE LOCATION: REPORTING TO: LINE MANAGEMENT RESPONSIBILITIES: Waterloo, London ICT Service Delivery None PURPOSE OF DIVISION: ICT is part of the
More informationPUBLIC SECTOR CAPACITY INJECTION PROJECT CALL FOR JOB APPLICATIONS
Federal Republic of Somalia National Civil Service Commission Capacity Injection Mechanism Unit Jamhuriyadda Federaalka Somaliya Guddiga Qaranka Shaqaalaha Rayidka Xarunta Mashruuca Tayeynta PUBLIC SECTOR
More informationPUBLIC PROCUREMENT SYSTEM AND REFORM IN AFGHANISTAN Anwar M. Raufi
Anwar M. Raufi 1729 OUTLINE OF THE CONTENTS OF THE TOPIC TO BE PRESENTED 1- Procurement system of Afghanistan before ten years, i.e. before 2001. Afghanistan had a series of provisions regulating procurement
More informationE-government Bulgaria Brussels, 5.10.2004
E-government Bulgaria Brussels, 5.10.2004 e-government Strategy from 2003 to 2005 The Action Plan envisions actions which will serve to attain the strategic objectives outlined in the Strategy for E-Government
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationHiring the Best Qualified Technology Coordinator: A Pennsylvania Perspective. Roger A. Place Lee James Lesisko
Hiring the Best Qualified Technology Coordinator 1 Hiring the Best Qualified Technology Coordinator: A Pennsylvania Perspective By Roger A. Place Lee James Lesisko Copyright 2005 Paper presented at the
More informationRequest for Proposal RFP No. IT-2015-101. Phone System Replacement
Request for Proposal RFP No. IT-2015-101 November 23 rd 2015 Phone System Replacement Deadline for Receipt of Proposals: January 18 th, 2016 at 4:30pm Proposals to be submitted by e-mail to Morgan Calvert
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationService Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.
Service Offerings Ensuring IT Resources are available, reliable, scalable & manageable always. SNICare has divided its end-to-end offering into three main segments which covers all the aspects of the IT
More informationICT Project Management
THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE MANAGEMENT ICT Project Management A Step-by-step Guidebook for Managing ICT Projects and Risks Version 1.0 Date Release 04 Jan 2010 Contact
More informationDEPARTMENT OF TRANSPORT
ANNEXURE L DEPARTMENT OF TRANSPORT Department of Transport is an equal opportunity, affirmative action employer with clear employment equity targets. Women and people with disabilities are encouraged to
More informationRECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on
More informationHow To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
More informationMainstream Renewable Power. Managed Network Services
Mainstream Renewable Power Case Study Managed Network Services 2 Case Study - Mainstream Renewable Power Overview Mainstream Renewable Power is working to become the leading offshore wind farm provider
More informationICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
More informationJISC data.bris project & EPSRC Platform project: progress against workplan (October 2012)
Project Name : data.bris DBSG/5/2 JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012) WORKPACKAGES Month: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Oct 11 Nov Dec
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationCAPABILITY STATEMENT
Level 4, 108 King William Street, South Australia 5000 The History Of Vintek Vintek was formed in 1988 as a partnership between Paul and Leanne Vinton. Vintek provided information technology support through
More informationIT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
More informationREQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES
REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES Midvale City is inviting qualified vendors to submit a Proposal to recommend, provide and potentially install a Desktop Management
More informationMETRO REGIONAL GOVERNMENT Records Retention Schedule
Program: Administration IS Administration provides strategic planning, direction, and central management oversight of the Information Services that includes the following programs: Desktop Support Services,
More informationBalboa Park Online Collaborative San Diego, California May 2013
Balboa Park Online Collaborative San Diego, California May 2013 Senior Network Engineer Job Description Status: Full time, non- exempt Hours: 9:00 5:00 p.m., Tuesday Saturday or Sunday - Thursday Salary:
More informationSupport to the State Chancellery in decentralization/local public policy formulation and implementation
United Nations Development Programme N Support to the State Chancellery in decentralization/local public policy formulation and implementation Four International Consultants: 1. Consultant in administrative
More informationREQUEST FOR EXPRESSIONS OF INTEREST (CONSULTANT SERVICES)
REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTANT SERVICES) Consultancy services for Systems Integration and IT project management Client: Central Bank of Yemen Country: Republic of Yemen Project: Financial
More informationCyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More information