Consultant for Security Framework of Mobile Applications Service Contract (Advisory Services)
|
|
|
- Cleopatra Wells
- 10 years ago
- Views:
Transcription
1 Ministry of Communications and Information Technology (MCIT) Islamic Republic of Afghanistan Request for Expressions of Interest for Individual Consultant Consultancy Services: Consultant for Security Framework of Mobile Applications Organization: Project Implementation and Coordination Unit (PICU) Project: ICT Sector Development Project-P121755{IDA Q 7440] Reference No.: PPF/C-8 Position: Contract Type: Duration: Duty station: Consultant for Security Framework of Mobile Applications Service Contract (Advisory Services) 3 months Kabul The Ministry of Communications and Information Technology (MCIT) of the Government of Afghanistan ( Government ) seeks to hire a qualified individual consultant ( Consultant ) to design and specify Network Security framework for the Mobile Applications that will be hosted at the Afghanistan National Data Center. Background The Government has requested funding from the International Development Association (IDA) of the World Bank Group for an ICT Sector Development Project in Afghanistan. This project, implemented by MCIT, seeks to (1) expand broadband connectivity, (2) mainstream use of mobile applications across the Government, and (3) develop the capacity of the IT sector to facilitate improved service delivery across Afghanistan. The indicative total cost of the project is US$40 million. The project envisages using a shared platform to deploy mobile applications. This will reduce costs and help aggregate demand across the Government. A critical infrastructure that will be part of the platform is the Afghanistan National Data Center (ANDC). The ANDC already provides a backbone for the e- Government program and will now be expanded to include mobile Government (m-government). ANDC is also considered to be a premier and essential component of the Government of Afghanistan in the field of Information Services and information Technology (IT) applications. With the inclusion of m-
2 Government, ANDC will be instrumental in steering ICT applications in Government Organizations on both Central and Provincial level for wider transparency in government functions and improvement in the decentralized planning and management. It will also address the needs of the private sector by providing latest and tailored to the needs technological infrastructure and services. ANDC has been identified as one of the core infrastructure components to consolidate services, applications and infrastructure to provide efficient electronic delivery of G2G, G2C and G2B services. ANDC will act as a mediator and convergence point between open unsecured public domain and sensitive government environment and it will also provide services for government s own access. It will enable various Government organizations to host their m-government services/applications on a common infrastructure leading to ease of integration and efficient management, ensuring that computing resources and the support connectivity infrastructure (WiMAX/Fiber Optic Ring) is adequately and optimally used. These services would be extended to Government agencies, Citizens and Businesses through the connectivity infrastructure being rolled out such as Government Cable Network (GCN) and ANDC to Clients WiMax connectivity. Data Centre would provide many functionalities like Central Repository of the databases for the Government, Secure Data Storage, Online Delivery of Services, Citizen Information/Services Portal, State Intranet Portal, Remote Management and Service Integration. The challenge the ANDC is facing is lack of suitable expertise to run and maintain the data center network infrastructure. Being a highly technical and advanced technological environment a highly skilled, professional and lead technical expert is required to fulfill the urgent and crucial needs of ANDC. This is a mandatory requirement for running the state-of-art facility and providing world class services to the government organizations. OBJECTIVE OF THE ASSIGNMENT The objective of the assignment is to assist ANDC network security department to design the security framework for the mobile applications that will be hosted in the ANDC. SCOPE OF WORK The consultant is expected to conduct the following: Review current IT security measures applicable to mobile applications hosted on the ANDC Supervision of Database Security Procedures Supervision of Data Encryption and Decryption Procedures Development of Data Security Procedures Supervising and observing the hackers and intrusion in the ANDC network Creating security watch dogs at the entrance level of the ANDC networks Troubleshooting, designing and maintaining the ANDC CISCO Network Infrastructure
3 Configuration of Routers, Switches and other devices as necessary Connecting NDC with clients via fiber/wimax network through Afghan Telecom Observing issues like: - Alerts and Warnings, - Incident handling, - Incident analysis, - Incident response on site, - Vulnerability Handling, - Vulnerability analysis, - Vulnerability response - Threats Announcements - Technology watch - Security Audits or Assessments - Development of Security Tools - Security-Related Information Dissemination - Risk Analysis - Security Consulting - Education/Training - Product Evaluation or Certification Designing network expansions and necessary changes and tunings. Maintaining the network and implementing ANDC policies and regulations. Connecting clients and providing access to requested services in an effective manner. Training the subordinates in various network related areas. The entire assignment is scheduled to be completed within 3 months from the date of signing the agreement. The consultant will be provided the following: - Office space, internet access. - Access to the ANDC network and passwords for various devices. - ANDC Network Design, Configuration and other technical documents. - Support to arrange meetings with clients and Afghan Telecom as required.
4 CONSULTANT QUALIFICATIONS AND eexperience At least a Bachelor s degree in Computer Networks or related fields. A Master s degree is preferable. 1. A Master s Degree with at least 3 years of experience or a Bachelor s degree with at least 5 years of experience in network and data securities and 5 years 2. Good understanding of system design and analysis 3. Understanding of international policies and standards in area of networks securities 4. Understating of Cisco platforms 5. Understanding of network security standards 6. Good understanding of computer hardware, server applications and operating systems 7. Understanding of international policies and standards in area of computer networks and hardware 8. A thorough knowledge of English is essential 9. Computer literacy and ability to effectively use office technology equipment, IT tools. 10. Good communication and interpersonal skills INTERESTED AND ELIGIBLE CANDIDATES must provide information indicating that they are qualified to perform the Services and are invited to submit their CV (Curriculum Vitae), including education background, employment records, description of similar assignments, experience in similar conditions, availability of appropriate skills). Expressions of interest must be delivered or sent by to the address below no later than 07 Feb, 2011; AM (Kabul Time). Foreign Procurement Department (FPD) Attn: Mr.Samimullah Samin General Manager for External Procurement Procurement Department, Ministry of Communications and IT (MCIT) Mohammad Jan Khan Watt Kabul, Afghanistan Office: Cell phone: [email protected] Web site: Copy to: Eng.Baryalai Hassam ; Deputy Minister Technical Ministry of Communication and IT, I.R of Afghanistan Mohammd Jan Khan Watt, Kabul Afghanistan Landline: [email protected] And also to: [email protected] Any queries on the position may also be addressed to the above mentioned addresses, latest 3 working days before the deadline for submission of applications.
5
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES]
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES] COUNTRY: NAME OF THE PROJECT: SECTOR: CONSULTING SERVICES: CONTRACT TYPE: DURATION OF ASSIGNMENT: DUTY STATION:
Ministry of Communications and Information Technology (MCIT); Islamic Republic of Afghanistan
Ministry of Communications and Information Technology (MCIT); Islamic Republic of Afghanistan BASIC DATA: Request for Expressions of Interest (REOI) and the Terms of Reference (TOR) Individual Consultant
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES]
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES] COUNTRY: NAME OF THE PROJECT: SECTOR: CONSULTING SERVICES: CONTRACT TYPE: DURATION OF ASSIGNMENT: DUTY STATION:
REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES FIRMS SELECTION)
REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES FIRMS SELECTION) Country: Islamic Republic of Afghanistan; Ministry of Communications and IT Name of the Project: Afghanistan ICT Sector Development
Consultancy Services: International Consultant E-GIF, ITIL standards and IT Governance Project: E-Government Resource Center (EGRC II)
Ministry of Communication and Information Technology (MCIT) Islamic Republic of Afghanistan Request for Expressions of Interest for Individual Consultant Consultancy Services: International Consultant
ADMINISTRATIVE STAFF:
MAKERERE P.O. Box 7062 Kampala Uganda Cables MAKUNIKA UNIVERSITY Telephone: 256-41-530295/531410 E.mail: [email protected] DIRECTORATE OF HUMAN RESOURCES OFFICE OF THE DIRECTOR EMPLOYMENT OPPORTUNITIES
Guidelines for Infrastructure & Application Hosting in SDC
Guidelines for Infrastructure & Application Hosting in SDC V 1.0 Department of Electronics & Information Technology, Ministry of Communications and Information Technology, Government of India Abstract
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC)
Guidelines For Technical and Financial Support For Establishment of State Data Centre (SDC) Department of Information Technology, Govt. of India, Electronics Niketan, New Delhi 110 003. 1.0 Preamble 1.1
Computer Technical Assistant
U.S. Embassy VACANCY ANNOUNCEMENT Computer Technical Assistant CLOSING DATE FOR THIS POSITION: Wednesday, April 21, 2014; 16:00 Juba Time ANNOUNCEMENT NUMBER: Juba-2014-MGT-04 OPEN TO: All Interested Candidates
Ministry of Information and Communication Technology EXPRESSION OF INTEREST
EXPRESSION OF INTEREST Consultancy Services for SubmarineFibre Optic Connectivity in Rodrigues (Authorised under Section 24(2) of the Public Procurement Act 2006) Reference No. : MICT/Q3/2012/EOI 1.0 Introduction
1. BACKGROUND. Terms of Reference. Background
GOVERNMENT OF SAINT VINCENT AND THE GRENADINES Caribbean Regional Communications Infrastructure Project TERMS OF REFERENCE FOR CONSULTING SERVICES For the Design of a National Broadband Network SVG CARCIP
PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
Request for Expressions of Interest IT System Consultant
Election Commission Secretariat Preparation of Electoral Roll with Photographs and Facilitating the Issuance of National Identity Card Project Islamic Foundation Building Agargaon, Dhaka. No. PERP&FINIDC/Ops/048/2011/2608
SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
Short Term Consultancy for Regional Database Expert for Implementation of IGAD Biodiversity Common Database.
Project: Biodiversity Management Programme: EDF/2012/23700 Subject: Short Term Consultancy for Regional Database Expert for Implementation of IGAD Biodiversity Common Database. Closing date : August 12,
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,
MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE
MINISTRY OF FINANCE, PLANNING AND ECONOMIC DEVELOPMENT THE THIRD FINANCIAL MANAGEMENT AND ACCOUNTABILITY PROGRAMME (FINMAPIII) TERMS OF REFERENCE IT SYSTEMS COMPLIANCE AND QUALITY ASSURANCE SPECIALIST
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Project title (in Chinese) 項 目
II Project Information Project title (in English) Project title (in Chinese) HKCAAVQ IT Infrastructure Development 香 港 學 術 及 職 業 資 歷 評 審 局 資 訊 系 統 基 建 發 展 Project 項 目 Project summary (Please provide an
Request for Proposals. Security Advisory Services for the International Executive Service Corps
Request for Proposals Proposal Title: Bid Reference Number: Security Advisory Services for the International Executive Service Corps IESC Security Advisory Services Issue Date: January 21, 2015 Closing
Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
Job Opportunity: ICT Manager CDEMA Coordinating Unit CDEMA-CU/CDM-HIP/07. Bridgetown, Barbados
Job Opportunity: ICT Manager CDEMA Coordinating Unit Competition Reference No. CDEMA-CU/CDM-HIP/07 Application Deadline Date February 21, 2012 Location Organization Bridgetown, Barbados Caribbean Disaster
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
STAFF VACANCIES Ref. 1527TAAST4
2 October 2015 STAFF VACANCIES Ref. 1527TAAST4 The European Insurance and Occupational Pensions Authority (EIOPA) is currently inviting applications for a position as IT Specialist for its Headquarters
SENIOR LECTURER IN EARLY CHILDHOOD DEVELOPMENT. Requirements
Daystar University is a chartered interdenominational and evangelical Christian University. Its mission is the development of Christian Servant Leaders for the expansion of God s kingdom in Africa and
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
TCIL/16/12/07/2015(WI) 22 nd July 2015. NIT for Pre-bid Tie-up for Disaster Management EoI
TCIL/16/12/07/2015(WI) 22 nd July 2015 NIT for Pre-bid Tie-up for Disaster Management EoI Telecommunications Consultants India Ltd., (TCIL), is a Government of India Enterprise under Ministry of Communications,
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
HI-TECH CO. SYSTEMS. Company Profile
HI-TECH CO. SYSTEMS Company Profile About Us HTCS is one of the fast-track high-end networking and service support companies based in Delhi. Our field of specialization includes Hardware procurement, AMC
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Get what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
Establishment of the EARMA Academy:
Establishment of the EARMA Academy: Part 1: EARMA Academy Feasibility Study Brussels: 3 September 2015 The EARMA General Assembly (GA), held at Leiden in June 2015, mandated the EARMA Board to establish
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE MASTER IT PROFESSIONAL II 43 B 7.909 SERIES CONCEPT Master Information Technology
Cisco Unified MobilityManager Version 1.2
Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.1, Release 1.2 The Cisco Unified Communications system of voice and IP communications products and applications enables
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
To establish a single channel for public procurement contracts.
EXPRESSION OF INTEREST (EOI) FOR RECRUITEMENT OF E-PROCUREMENT APPLICATION MANAGER CONSULTANT (X3) 1.0 Background The Government of Rwanda (GoR) wishes to capitalize on employing the use of the most advanced
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
TEMPORARY JOB OPENING ANNOUNCEMENT
UNITED NATIONS NATIONS UNIES Ref. No.: NA-15-08 TEMPORARY JOB OPENING ANNOUNCEMENT P3 Information Systems Officer TJO Grade Level 1 Functional Title UNEP/OFO Department/Office/Division/ Service/Section
Policy Brief. Public e-procurement at the local level in Albania. Challenges in the fight against corruption. Mona Xhexhaj
Policy Brief Public e-procurement at the local level in Albania Challenges in the fight against corruption Mona Xhexhaj This policy brief has been prepared in the frame of the TRAIN Programme 2014 (Think
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK TABLE OF CONTENTS 1 Introduction 2 2 Operational Insight 3 3 Cloud Management Process Control 4 4 Infrastructure, Application & Data Security 5 5 Continuous Improvement
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
TERMS OF REFERENCE Consultancy to develop a Strategic Plan for the Sri Lanka Institute of Development Administration (SLIDA)
TERMS OF REFERENCE Consultancy to develop a Strategic Plan for the Sri Lanka Institute of Development Administration (SLIDA) 1. Background The Sri Lanka Institute of Development Administration (SLIDA),
Central Information Systems Division ICT Manual
Central Information Systems Division ICT Manual May 2015 1 Table of Contents 1. Introduction... 2 2. Structure of CISD... 3 2.1 Technical Staff... 3 2.1.1 Analyst Cadre... 3 2.1.2 Operations Cadre... 4
OVERVIEW. GDC is - Your Best Connection
OVERVIEW General DataComm (GDC) has over 35 years of field-proven experience in the successful deployment and maintenance of voice and data networking equipment. GDC is highly skilled in all aspects of
Project Management Specialist (Health) Type of vacancy:
Solicitation is open to: Position Title: Type of vacancy: Afghan Nationals ONLY Project Management Specialist (Health) Single Opening date: June 18, 2014 Closing date: July 09, 2014 Vacancy announcement
U SAID BENIN. TO: FROM: Subject: Date: USAID/Benin is accepting applications for the following position: POSITION TITLE: NUMBER OF POSITIONS: GRADE:
U SAID BENIN FROM THE AMERICAN PEOPLE TO: FROM: Subject: Date: All qualified Applicants Clemencia Acacha Bonou, Supervisory Executive Specialis Job Opportunity Announcement Solicitation #: 680-14-007 April
Timor- Leste. United Nations Development Programme. Vacancy Announcement
United Nations Development Programme Timor- Leste Vacancy Announcement Project Title: Strengthening Capacities for Disaster Risk Management in Timor Leste Post Title: National Administration and Finance
Hardware. Maintenance
Government Services available through the portal 1. The scope of the work is limited to the portal and its integration with service provider applications. It doesn't include any work on the service provider
Government of Nepal. Strengthening Regional Cooperation for Wildlife Protection in Asia Project. IDA Grant No.: H 6660. Terms of Reference
Government of Nepal Strengthening Regional Cooperation for Wildlife Protection in Asia Project IDA Grant No.: H 6660 Terms of Reference Consulting Services for Website development of DNPWC and SAWEN (Contract
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please
.:::::::::::..:...:. ::::: f~~).t BAKHT AR .. :::.' ~. ~, INSTITUTE OF HIGHER EDUCATION .:::::::::::. '1'''' MASTER DEGREE PROGRAM.
..:..-.:::::::::::..:...:. ::::: f~~).t BAKHT AR.. :::.' ~. ~, INSTITUTE OF HIGHER EDUCATION.:::::::::::. '1'''' MASTER DEGREE PROGRAM MBAlkMCS Bakhtar Institute of Higher Education Introduction: Considering
Villiers High School ICT Department Job Description
Villiers High School ICT Department Job Description Position Title: Responsible To: Salary: IT Manager Head of ICT (Curriculum) TBC General Function The IT Manager is responsible for ensuring the school
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Applications are invited for the above Contract Agent post at the European Centre for Disease Prevention and Control (ECDC).
European Centre for Disease Prevention and Control Vacancy for the post Human Resources Specialist in the Resources Management and Coordination Unit (ECDC/CA/FGIII/2015/RMC-HRS) Applications are invited
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
ICTTEN5204A Produce technical solutions from business specifications
ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor
How To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
Current IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
Islamic Relief Worldwide ICT Desktop Support Technician
Islamic Relief Worldwide ICT Desktop Support Technician BASE LOCATION: REPORTING TO: LINE MANAGEMENT RESPONSIBILITIES: Waterloo, London ICT Service Delivery None PURPOSE OF DIVISION: ICT is part of the
PUBLIC SECTOR CAPACITY INJECTION PROJECT CALL FOR JOB APPLICATIONS
Federal Republic of Somalia National Civil Service Commission Capacity Injection Mechanism Unit Jamhuriyadda Federaalka Somaliya Guddiga Qaranka Shaqaalaha Rayidka Xarunta Mashruuca Tayeynta PUBLIC SECTOR
PUBLIC PROCUREMENT SYSTEM AND REFORM IN AFGHANISTAN Anwar M. Raufi
Anwar M. Raufi 1729 OUTLINE OF THE CONTENTS OF THE TOPIC TO BE PRESENTED 1- Procurement system of Afghanistan before ten years, i.e. before 2001. Afghanistan had a series of provisions regulating procurement
E-government Bulgaria Brussels, 5.10.2004
E-government Bulgaria Brussels, 5.10.2004 e-government Strategy from 2003 to 2005 The Action Plan envisions actions which will serve to attain the strategic objectives outlined in the Strategy for E-Government
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Hiring the Best Qualified Technology Coordinator: A Pennsylvania Perspective. Roger A. Place Lee James Lesisko
Hiring the Best Qualified Technology Coordinator 1 Hiring the Best Qualified Technology Coordinator: A Pennsylvania Perspective By Roger A. Place Lee James Lesisko Copyright 2005 Paper presented at the
Request for Proposal RFP No. IT-2015-101. Phone System Replacement
Request for Proposal RFP No. IT-2015-101 November 23 rd 2015 Phone System Replacement Deadline for Receipt of Proposals: January 18 th, 2016 at 4:30pm Proposals to be submitted by e-mail to Morgan Calvert
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
Service Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.
Service Offerings Ensuring IT Resources are available, reliable, scalable & manageable always. SNICare has divided its end-to-end offering into three main segments which covers all the aspects of the IT
ICT Project Management
THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE MANAGEMENT ICT Project Management A Step-by-step Guidebook for Managing ICT Projects and Risks Version 1.0 Date Release 04 Jan 2010 Contact
DEPARTMENT OF TRANSPORT
ANNEXURE L DEPARTMENT OF TRANSPORT Department of Transport is an equal opportunity, affirmative action employer with clear employment equity targets. Women and people with disabilities are encouraged to
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
ICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
CAPABILITY STATEMENT
Level 4, 108 King William Street, South Australia 5000 The History Of Vintek Vintek was formed in 1988 as a partnership between Paul and Leanne Vinton. Vintek provided information technology support through
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES
REQUEST FOR PROPOSAL FOR DESKTOP MANAGEMENT SYSTEM FOR MIDVALE CITY OFFICES Midvale City is inviting qualified vendors to submit a Proposal to recommend, provide and potentially install a Desktop Management
REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTANT SERVICES)
REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTANT SERVICES) Consultancy services for Systems Integration and IT project management Client: Central Bank of Yemen Country: Republic of Yemen Project: Financial
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
