We support our clients production environments. This includes:
Providing IT Linux security consultancy, participating in the testing and deployment activities of Identity and Access Management solutions; perform operational activities in order to maintain our IAM environment or Database Access Monitoring
Network Security: provide network connectivity with security devices as well as Internet connectivity. troubleshooting and security consulting in complex segregated networks including high availability production networks. Security technologies supported include: F5 and DenyAll WAF, Checkpoint Threat Emulation, BlueCoat web-proxy, Cisco ESA email gateway, Cisco CNR DNS/DHCP, Meinberg NTP technologies, IP routing protocols.
IT and Operations production support, including producing functional and technical specifications; participating and support the application development activities; providing 1st line support during production rollout and post implementation phases