your career. General Role Description The Cyber Security Analyst is responsible for monitoring, detecting Responsibilities: Monitor and analyze security alerts from various security tools and information sources to incidents. Investigate suspicious activities, security breaches, and cyber attacks to determine their to identify security gaps and propose remediation strategies. Develop and implement security standards countermeasures to mitigate risks and enhance the overall security posture. Collaborate with cross-functional teams
highly experienced General Manager: Technology Security to join their team in Roodepoort, Johannesburg developing and implementing a comprehensive technology security strategy and framework, including developing and Organisation's technology security, together with proactively implementing security measures and controls Develop and implement a comprehensive technology security strategy and framework for the Organisation, aligned aligned with the Group's Information Security strategy. Oversee the development and implementation of
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
rience with security standards and their implementation
hardware analysis and the contribution to the security of their systems. Your background in system administration hardware components to ensure their integrity and security. • System Administration: Utilize your MS Server server systems, ensuring optimal performance and security. • Cloud Infrastructure Management: Assist in reliability, and security. • Network Security: Implement and maintain network security measures, including senior analysts and other team members to identify security vulnerabilities and develop strategies for mitigation
stakeholders.
developing and executing ICT Infrastructure and Security roadmaps aligned with the Client's goals and objectives envisioning the future state of infrastructure and Security requirements within the Organization, identifying initiatives. Manage and implement ICT infrastructure and security, including network systems, servers, storage, cybersecurity. Oversee ICT infrastructure and security projects, ensuring adherence to timelines, budgets Develop and execute strategic ICT Infrastructure and Security roadmaps aligned with Client goals, contributing
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider