our company's IT infrastructure, ensuring its security and reliability, and providing technical support permissions. Maintain network security and implement appropriate security measures. Implement monitoring permissions. Maintain network security and implement appropriate security measures. Implement monitoring systems Familiarity with network protocols and security measures R30 000 - R45 000 CTC
Accountable for: Safety and Security of the campuses Ensuring general security functions / access control supply chain/loss prevention meetings. Managing the Security Budgets (PNL) and verifying service provider invoices Educational level: Grade 12 (Essential) Psira – Private security legislation certification (Advantageous) Previous
Accountable for: Safety and Security of the campuses Ensuring general security functions / access control supply chain/loss prevention meetings. Managing the Security Budgets (PNL) and verifying service provider invoices Educational level: Grade 12 (Essential) Psira – Private security legislation certification (Advantageous) Previous
will be responsible for ensuring the stability, security, and efficient operation of our company's IT infrastructure troubleshooting, and performance tuning. - Conduct security audits and implement necessary measures to protect performance, and security. - Implement and manage virtual networks, subnets, and network security groups. - access solutions. - Monitor and manage network security, including intrusion detection and prevention
of cloud security principles and best practices, with a track record of implementing security measures Automation Cloud Infrastructure Dev Ops Quality and Security Collaboration Stakeholder Engagement Leadership
and methodologies. Robust understanding of cloud security protocols and best practices. Proven experience efficient development and deployment. Security - Implement and maintain security best practices, ensuring our
development teams. • Design and perform server and security audits, system backup procedures, and other recovery negotiate with vendors, outsourcers, and contractors to secure system-related products and services. • Participate products. • Proven experience with systems planning, security principles, and general software management best
forwarders and transporters b. Clearing agents c. Security agencies d. 3rd Party assaying companies e. All
business within (but not necessarily limited to) the security industry. Formal sales training or equivalent skills • Practical knowledge of South African security industry • Working knowledge of intrusion and
ensure that our database systems are efficient, secure, and reliable. Responsibilities: Design, develop translate them into technical solutions Ensure data security and integrity by implementing best practices and