for a professional Principal Specialist: Cyber Security contract role for 12 months. Desirable: An industry and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. At Protection and Payment Card Industry (PCI)/Data Security Standard. High level understanding and Knowledge operating multiple security programs, projects, and initiatives and related security tooling An ability understanding of Tech Security risks and mitigating solutions A diverse security background with knowledge
Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, advises customers and the Engineering team on the security systems' maturity and resilience posture for protecting Serve as the primary point of contact for all security incidents, working with various teams to resolve timely and efficient manner. Investigate potential security breaches, conducting root cause analysis and developing prevent future incidents. Implement and maintain security controls in accordance with industry best practices
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
Network Security Support Engineers to join a highly motivated and energetic team of security specialists specialists. The range of security technologies used by customers typically includes next generation firewalls firewalls, VPN, SDWAN, threat prevention, secure web gateways, CASB, authentication and end point protection would include: Administration and configuration of security technologies Support and troubleshooting System Min 2 years full-time experience working with security technologies – (Fortinet experience an advantage)
JOB DESCRIPTION Key Responsibilities: Security Monitoring Perform log ingestion, define use cases, and health checks and remediate accordingly. Monitor security alerts and events using various tools and technologies technologies. Analyze and investigate security incidents to identify potential threats. Collaborate with environment. Incident Response Respond promptly to security incidents, provide initial analysis, conduct business maintain endpoint security and EDR solutions. Perform daily health checks endpoint security and EDR solutions
systems, and other security appliances for network security. Design and implement secure network architectures Zero Trust model. Utilize encryption protocols to secure data in transit and at rest. Configure and maintain Networks (VPNs) for secure remote access. Harden network infrastructure by implementing security best practices practices. Use Security Information and Event Management (SIEM) tools for monitoring and responding to security (IAM) solutions. Ensure timely application of security patches to network devices. Qualifications and
unauthorized access or leakage of sensitive information. Secure databases, including access controls, encryption monitoring and responding to security events related to data. Implement secure methods for transferring files field. Proven experience in roles related to data security, data management, or cybersecurity. Knowledge Strong communication skills for conveying data security concepts to technical and non-technical stakeholders and problem-solving skills for addressing data security challenges. Ability to collaborate with IT teams
Good understanding of networking and network security is a must; knowledge of cryptographic principles
/>- Good understanding of networking and network security
- Systematic and analytical approach to problem
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis