our clients' security postures. - Assist in the development and implementation of security measures to assessments and penetration testing. - Analyze security breaches to identify the root cause and implement development of security policies, procedures, and guidelines. - Assist in the creation of security awareness - Knowledge of security frameworks and standards - Familiarity with various security tools and technologies
CET004020-DE-1 Wholesale and distribution company in the Security Industry requires a Technical Manager to manage availability of all internal systems Design of security systems and solution testing Manage training academy Service Manager Must have security product knowledge and design of security solutions R420000.00 - R480000
responsible for identifying vulnerabilities and security risks in various IT systems, applications, and simulate cyber-attacks to test the effectiveness of security measures and to identify any weaknesses before Bachelor's degree in computer science, Information Security, or at least two years' experience. Relevant certifications certifications such as OSCP (Offensive Security Certified Professional), CEH (Certified Ethical Hacker) similar role in cybersecurity. Strong knowledge of security across various platforms including Linux, Windows
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (Min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills: Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance Compliance Cyber Security Monitoring Personal Attributes: Action orientated - Contributing independently Decision
delivering cutting-edge hardware and software-based security solutions in the ICT industry, is looking for They pride themselves on developing secure networking encryptors, secure mobile communications, and cryptographic Develop and maintain software applications for secure networking encryptors, mobile communications, and trusted operating system, ensuring its integrity and security. Collaborate with a diverse team to design custom Strong understanding of networking and network security. Systematic and analytical approach to problem-solving
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
Solutions: Product Specialist on all security products Design of Security Solutions Competent Sales Engineers Internal Technical Systems Security Product Knowledge Design of Security Solutions