stakeholders.
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
the GROUP enterprise UEM, Endpoint Protection, security platform components and tools. (e.g. EDR Production for the verification, planning and actioning of security topics together with other IT teams. Continuously work on improving the operational stability and security. Work on operations, troubleshooting and maintenance improve the security posture of our platforms Test and integrate new features Take care that security related coordination to reach the KPIs and SLAs in the security reporting. QUALIFICATIONS/EXPERIENCE Min. 5-7
experience as a DevSecOps Engineer or in the Cyber Security sector
Like Optimus Prime working in harmony
processes, constructing a powerful and resilient security infrastructure
As a member of the Autobot
role in defining, implementing, and maintaining security strategies, always staying one step ahead of emerging
you embody a profound understanding of Microsoft Security features, enabling you to identify vulnerabilities
Cape. Company Name: Broubart Security. Job Opportunity at Broubart Security Alarms Division in East London London, Eastern Cape. Broubart Security, a trusted name in the security industry, is actively seeking skilled and a well-rounded lifestyle. Why Join Broubart Security Alarms Division: Contribute to the expansion of and are passionate about ensuring the safety and security of our community. An Important Announcement from . Early applications are encouraged. Broubart Security is an equal opportunity employer, committed to
Good understanding of networking and network security is a must; knowledge of cryptographic principles >Good understanding of networking and network security
South African citizenship (for security clearance purposes
payments, procurement, service management, data security related processes and IT support services. 1. includes user account management, access control, and security configuration. 3. Network Operations: Managing optimization, and security compliance. 4. Security Operations: Implementing and maintaining security measures intrusion detection systems, and conducting regular security audits and assessments. 5. Incident Response: