Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

IVR Designer

Job Title: IVR Designer
Contract Type: Contract
Location: Berkshire, Berkshire
Industry:
Salary: Negotiable
Start Date: ASAP
Duration: 6 months
REF: IVR_1409920694
Contact Name: Sam Freedman
Contact Email: samf@montash.com
Job Published: about 3 years ago

Job Description

Montash have been engaged by a Global Organisation to source and secure an IVR designer to work in a complex and fast paced environment. The Designer will fulfil an integral role in the maintenance, monitoring and upkeep of the assets which reside within the Fixed Line NIVR Zone.

 

Key Responsibilities

Working with Security Analyst and PCI NIVR Technical Service Owner to create, test and implement actions as required from the outputs from the on-going monitoring and upkeep of the assets.

Ensure that proposed measures to be put in place meets Operational requirements as well as addressing the PCI requirements

Compile, create and update the install packages script for the NIVR platform for Solaris 10 - including suitably updated configuration files relevant to the new packages

Supports Assure and PCI Team members with any resulting investigation activities to determine the root cause of alerts or issues and to determine an appropriate response as necessary

Patch/configuration evaluation - mange and test patches, patch configuration and server configuration to evaluate the stability and to ensure that functionality is not impacted by new patches

Coordinate with vendors (where necessary) to ensure patches are compatible with support agreement/configuration

Provide input to the scoping of the annual Pen Testing activities required to support compliance within the NIVR Zone

 

 

Skills and Responsibilities

Essential

Excellent inter-personal and communication skills

Ability to script (ksh, batch and Perl)

Experience with working with both Windows and *nix type systems

Ability to use gcc to compile Solaris packages from source to incorporate custom configuration files for both i586 and Sparc architectures

Knowledge of how to configure SSHD/oPENssh, Tomcat and Apache in accordance to security best practices

Experience and knowledge of security configuring Solaris 10, SSH, Windows 2008 Server, Apache load-balancers, Tomcat servers, Oracle 11 databases and Weblogic 11 servers would be a bonus

 

Desired

Working experience of PCI compliance

SSL deployment, configuration and java code troubleshooting experience

 

 

"Interactive Voice Response" / "IVR" / "NIVR"/ "Designer" / "PCI" / "BPSS" / "Security" / "Security Analyst" / "Windows" / "Solaris" / "KSH" / Batch" / "Perl" / SSHD" / "Tomcat" / "Apache" / "Sparc" / "Java JVM" / "SSL" / "VXML" / "Weblogic" /

Similar Jobs You May Also Be Interested In

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...