implement ICT Security MAIN OUTPUTS Deliver efficient and effective support services in ICT security related implement ICT security protocols in line with security best practice Identify ICT security gaps, recommend solutions and enhancements to management Help plan the security strategy Incident response, threat hunting, remediation remediation and incident tracking Leading ICT security investigations and providing feedback to management optimizing, fine-tuning, and monitoring ICT systems security (Firewalls, networks devices, applications, cloud
Nexio Cyber Security team, the Security Specialist will be responsible for the Security Operations as as per the agreed Statement of Work for Managed Security Services with Customers. ROLE REQUIREMENT - Adheres procedure and playbooks in the Nexio Security Operations Team. The Security Specialist uses his/her technology ensure that the organization’s cyber essentals and security platforms’ housekeeping are in place covering Customer satisfaction and confidence in the Nexio Security Operations and service level performance. Impacts
their team and contribute to the development of secure software solutions while ensuring compliance with requirements. This role will primarily focus on Secure Software Development (SGD) and contribute to enhancing Cybersecurity Environment. Familiarity with DevSecOps (Secure Dev Ops) practices. Minimum 5 years of software Operating Systems. Understanding of DevSecOps (Secure Dev Ops) principles. Qualifications: BEng in Computer
Electronic Security Systems, such as CCTV, Access Control, Perimeter and Intruder detection and security software
please consider your application unsuccessful IT Security and GRC Manager Location: Johannesburg, Gauteng framework that provides assurance that information security and strategies are aligned with and support business critical technical and leadership-oriented IT security certifications, such as CISA, CRISC, CISSP, CISM experience in planning, organizing, and developing IT security teams and strategy. Substantial exposure to data Essential: 3 - 5 years proven track record in IT Security and GRC 3 - 5 experience in governing a Microsoft
they are progressing as planned. Monitoring the security alerts and ensuring the timely resolution of vulnerabilities landscape, including updates on ongoing projects, security posture, and system performance. Holding team large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection detection, threat analytics, security incident and event management (SIEM), information technology (IT), and
to an absolute minimum. • Build an ATM physical security strategy which minimises the threat of cash and colleagues to ensure that, where appropriate, security tools are implemented both at the ATM and across parties and emergency responders to ensure effective security and emergency response plans; the aim of this investigated and reported. • Oversee the day-to-day security operations, including emergency response planning planning and recoveries. • Control budgets for security operations and monitor expenses • Oversee the delivery
North seeks the services of Securities Services Analyst rep SSH (Securities Services Head) South Africa relating to business management. POSITION OBJECTIVE: Securities Services analyst takes responsibility for client Knowledge/Experience: 1-2 years practical work experience in Securities Services R 1 - R 2 - Monthly
Xcede We have a current opportunity for a Cybersecurity Specialist on a permanent basis. The position will be based in Sandton. For further information about this position please apply.
Information Security Engineer will be responsible for ensuring the security of our information systems various security tools and platforms, as well as the development and implementation of secure networks Design, implement, and maintain the organisation's security infrastructure. Conduct regular system tests and network security. Develop technical solutions and new security tools to help mitigate security vulnerabilities possible about security incidents. Establish protocols and procedures for responding to security breaches.