community – is seeking to urgently place a Network Security and Support Engineer to protect highly confidential focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures threats Duties: Design, configure, and implement secure network solutions, including firewalls, intrusion software and WiFi issues Develop and enforce network security policies, procedures, and best practices installing g. ISO27001, GDPR) and their impact on network security Solid understanding of network protocols, routing
Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, advises customers and the Engineering team on the security systems' maturity and resilience posture for protecting digital assets. Key Objectives: Serve as the primary point of contact for all security incidents, working timely and efficient manner. Investigate potential security breaches, conducting root cause analysis and developing prevent future incidents. Implement and maintain security controls in accordance with industry best practices
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Co-ordinate on-site activities of contracted Security Service Provider Ensure compliance within the improvement initiatives and protocols (ISO, GMP, 20 Keys, etc.) Ensure that the services provided by third-party third-party service providers, e.g. Kaelo, the Fidelity Security Group, amongst others, is monitored, assessed must meet the following requirements: A completed National Diploma in Safety and Risk Management or an equivalent processing environment Knowledge of the 20-Keys system MS Office (Outlook, Excel, Word and PowerPoint) Knowledge
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Reference: CPT005197-GP-1 Cybersecurity Engineer Secure your future with this giant in the aerospace and equivalent work experience) Security Higher certifications in the flowing key vendors… Fortinet (NSE 5
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
financial services industry is looking for a SAP Security Specialist to join their dynamic company. As a permissions) and ECC HR Security Specialist, you will be responsible for providing security support within the action to reduce risk on the systems. Provide SAP Security support skills to business end users and team of remediation. Manage projects within the SAP Security area. Be responsible for coordination and managing Systems or related would be beneficial. SAP System Security and Authorizations or SuccessFactors certification