Conducting regular vulnerability assessments on the IT infrastructure and ensure timely remediation.rn• Installation and configuration of software and hardware and patching.rn• Regular independent vulnerability assessment of IT systems and network.rn• Assisting in setting up user accounts, databases, servers and workstations.rn• Evaluating and implementing information security systems/tools for instance installation of Kaspersky firewall, Virtual Private Network and so on.rn• Managing and monitoring of data leakage, protection/data loss prevention and database security solutions and processes.rn• Monitoring performance and maintaining systems according to requirements.rn• Troubleshooting issues and outages within the system.