devices, such as switches and firewalls, to maintain secure and efficient connectivity. Monitor our WAN links performance. Implement and manage information security measures, including antivirus software and endpoint administration. Proficiency in Microsoft Azure and Office 365. Strong understanding of server technologies management. Thorough knowledge of information security practices, including endpoint protection and intrusion
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
The company's offices are located in Sandton, Johannesburg, with facilities including office space, a conference enhance the organization's network efficiency and security. Responsibilities: Develop and execute network updates or modifications to maximize performance and security. KPIs: Network uptime target of 99.95%. Scheduled maintenance tasks. Security Management Responsibilities: Define and implement security policies, manage systems to protect the network. KPIs: Adherence to security standards and regulatory compliance. Average time
The company's offices are located in Sandton, Johannesburg, with facilities including office space, a conference enhance the organization's network efficiency and security. Responsibilities: Develop and execute network updates or modifications to maximize performance and security. KPIs: Network uptime target of 99.95%. Scheduled maintenance tasks. Security Management Responsibilities: Define and implement security policies, manage systems to protect the network. KPIs: Adherence to security standards and regulatory compliance. Average time
delivering cutting-edge hardware and software-based security solutions in the ICT industry, is looking for They pride themselves on developing secure networking encryptors, secure mobile communications, and cryptographic Develop and maintain software applications for secure networking encryptors, mobile communications, and trusted operating system, ensuring its integrity and security. Collaborate with a diverse team to design custom Strong understanding of networking and network security. Systematic and analytical approach to problem-solving
infrastructure and ensure its reliability and security.
management, Infrastructure management data analysis, security or product development OR equivalent experience Infrastructure Management, stakeholder engagement, security, and analytics or similar Passion for building infrastructure to ensure performance, reliability, and security. Oversee the design, implementation, and maintenance storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure professional development. 5. IT Security and Compliance : Develop and enforce IT security policies, procedures,
Teamwork and communication skills · Knowledge in IT security · Knowledge in ITIL processes · Any additional working environment · Modern, state-of-the-art offices · Dynamic Global Team collaboration · Application users of the solutions, the architects and the security. In an international and demanding environment
and communication skills
· Knowledge in IT security
· Knowledge in ITIL processes
· Any
working environment
· Modern, state-of-the-art offices
· Dynamic Global Team collaboration
·
users of the solutions, the architects and the security.
In an international and demanding environment
/>