3-to-5-year cyber security strategy across the company Achieve and maintain and target cyber security maturity programmers. Support the design, develop and implement a security programmer for the company No or per target Internal findings related to the company for cyber security Ensure a cyber security incident response practice is in place place across the company Promote awareness of security policies, training, and the governance strategy amongst all levels of the company to ensure sound security governance is reflected across the entity Actively
Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: PSIRA registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
Systems and Security Analyst
Cape Town | On-site
As our Systems and Security Analyst, you application lifecycle management and ensuring system security, availability, performance, stability, and support analyst Server, Storage, Networking, and Security. You have MCSA or MCSE as well
You must have network security experience, IT security methodology and remediation understanding
/>- Design, install and manage security mechanisms that protect the company's network
Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining
Develop and implement standardised Information Security processes and procedures;
- Respond to internal
to ensure compliance and correction of all IT security issues;
- Conduct IT risk assessments;
- Research, plan, and implement information security technical solutions to meet business requirements
manage, and administer the company's network security. Ensure all network components are managed in ensure compliance. •Design, install and manage security mechanisms that protect the business' network •Upgrade systems by implementing and maintaining security controls. •Protect the system by defining access •Develop and implement standardised Information Security processes and procedures. •Respond to internal experience in IT governance and security. •Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will
plan, manage, and administer the client's network security. Ensure all network components are managed in ensure compliance. Design, install and manage security mechanisms that protect the clients's network Upgrade systems by implementing and maintaining security controls; Protect the system by defining access Develop and implement standardised Information Security processes and procedures; Respond to internal to ensure compliance and correction of all IT security issues; • Conduct IT risk assessments; Assist
industry
IT Compliance and Security Specialist (JB4361) Sandton, Gauteng R40 000 to R45 000 a month CTC Permanent IT Compliance and Security Specialist to join their Team. Their products cover coin and banknote counting electronic drop safes for retail establishments, coin sorting and sachet equipment used by CIT companies IT Risk Assessments, networks, servers, cyber security, and general end user support. Candidate must must have knowledge of I.T. Operations, security, governance, frameworks, and a firm grasp of the below to
unauthorized access or leakage of sensitive information. Secure databases, including access controls, encryption monitoring and responding to security events related to data. Implement secure methods for transferring files field. Proven experience in roles related to data security, data management, or cybersecurity. Knowledge Strong communication skills for conveying data security concepts to technical and non-technical stakeholders and problem-solving skills for addressing data security challenges. Ability to collaborate with IT teams
highly skilled Cyber Security Principal Lead/Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building