Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
“Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 sector is looking for a professional Information Security Officer. The business’ core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems Information Security Manager KPAs 5 years’ experience in Cyber Security Framework Knowledge of Security best
seeking a highly skilled and experienced Cloud Security Engineer to join our team on a full-time basis responsible for designing, implementing, and maintaining secure cloud environments for our clients. This role requires requires a deep understanding of cloud security best practices and a strong background in cloud infrastructure infrastructure and architecture. 1. Cloud Security Focus Develop and execute the Cloud technology roadmap with cloud and cloud security technologies. Engage with business units to ensure secure Cloud deployments
“Document Control and Project Coordinator (JB4278) Meyerton (Office-based for 3 months, then Hybrid) Permanent Join our engineering firm as a Document Control and Project Coordinator We’re looking for a proactive verify with Kontak Recruitment.” The post Document Control and Project Coordinator (JB4278) appeared first
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships.
management, group policy administration, and domain controller configuration. Assist maintaining DNS infrastructure systems are protected against malware and other security threats. Configure and maintain printers and printer business continuity. Administer Mimecast email security and archiving solutions. Support and administer troubleshooting. Familiarity with antivirus products and security best practices. Proficiency in managing printers
management, Infrastructure management data analysis, security or product development OR equivalent experience Infrastructure Management, stakeholder engagement, security, and analytics or similar Passion for building infrastructure to ensure performance, reliability, and security. Oversee the design, implementation, and maintenance storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure IT Security and Compliance : Develop and enforce IT security policies, procedures, and controls to protect
operations. Implement and maintain documentation and controls for the system. Optimize T-SQL code and stored database administration, including backups, user security, and maintenance. Provide end-user Syspro support experience, particularly with month[1]ends, year-ends, security, and permissions. Strong leadership skills. Advanced
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills