managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
the GROUP enterprise UEM, Endpoint Protection, security platform components and tools. (e.g. EDR Production for the verification, planning and actioning of security topics together with other IT teams. Continuously work on improving the operational stability and security. Work on operations, troubleshooting and maintenance improve the security posture of our platforms Test and integrate new features Take care that security related coordination to reach the KPIs and SLAs in the security reporting. QUALIFICATIONS/EXPERIENCE Min. 5-7
Cape. Company Name: Broubart Security. Job Opportunity at Broubart Security Alarms Division in East London London, Eastern Cape. Broubart Security, a trusted name in the security industry, is actively seeking skilled and a well-rounded lifestyle. Why Join Broubart Security Alarms Division: Contribute to the expansion of and are passionate about ensuring the safety and security of our community. An Important Announcement from . Early applications are encouraged. Broubart Security is an equal opportunity employer, committed to
Good understanding of networking and network security is a must; knowledge of cryptographic principles >Good understanding of networking and network security
South African citizenship (for security clearance purposes
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
Industry is looking for an Azure Infrastructure and Security Specialist(senior) if you meet the below requirements implementation of Active Directory security concepts and IT Security Solutions in Azure · Advanced network systems like Git · Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Microsoft Defender products and Active Directory security best practices · Teamwork and strong internal and
management measures as well as the identified security measures for the assigned applications. Controls for scalable, distributed systems. Security of AWS services, securing design of VPC architectures. RESTful
management measures as well as the identified security measures for the assigned applications. Controls for scalable, distributed systems. Security of AWS services, securing design of VPC architectures. RESTful