Reference: PE010794-Podu-1 Cyber Security Specialist Key Roles and Responsibilities: Determine who requires & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them. Good working knowledge of various security technologies such as network and application firewalls
is looking for a Systems Engineer - Information Security for one of their clients based in Johannesburg troubleshooting experience within the security field. Experience in Web and email security application. The person Engineer, Information Security in developing and managing information security programs related to the integrity and protection of business information security and ICT assets and is also primarily responsible analytical capability in support of the Information Security Team objectives. Qualifications and Skills Required:
Months Fixed term Contract. We need a Network Security professional with over 3 years of experience in Cisco ESA mail security Cisco VPN Cisco ISE DNS ESET antivirus SSL/PKI CCNP Security certification is is preferred, but a well-rounded Cisco security expert would still be ideal, even if you do not possess certification. 3 Years Experience is required in CISCO Security. Education - Matric and above.
tool
to join our team in the Computer & Network Security industry. As a Mid Tier Consultant, you will play
guidance and support to our clients in optimizing and securing their mid-tier application layers. This is a challenging
understand their mid-tier application requirements and security objectives
Design, develop, and implement
solutions that meet clients'' security needs
Perform security assessments, vulnerability scans
mid-tier applications
Identify and recommend security enhancements and best practices for mid-tier application
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool
tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (Min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills: Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance Compliance Cyber Security Monitoring Personal Attributes: Action orientated - Contributing independently Decision
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging