Africa is looking for an Azure Infrastructure and Security Specialist to join their dynamic team. Use health up to date about security risk and mitigations to constantly strengthen the security Active participation implementation of Active Directory security concepts and IT Security Solutions in Azure Advanced network versioning systems like Git Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Microsoft Defender products and Active Directory security best practices. Should you not receive a response
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
enterprise IT network know-how, including network security (firewalling) - Container-based application virtualization enterprise IT network know-how, including network security (firewalling) WHAT WILL BE YOUR ROLE AND RESPONSIBILITIES (technical requirements as well as process or IT security governance requirements) - Go-live preparation maintain internal controls that mitigate business risk while complying with policy and procedures - Flexibility
be physically fit Highly motivated individual with strong self-management skills. High level of trustworthiness work vehicle and job site are kept in a safe and secure manner. Ensure that compliance of all Occupational
digital certificates and patch security vulnerabilities. Uphold a high standard of cybersecurity at all
digital certificates and patch security vulnerabilities. Uphold a high standard of cybersecurity at all
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
effectiveness of controls established to address those risks. • Develop desktop procedures to clearly document business partners (finance and non-finance) to secure information to develop and confirm accounting outcomes Hands on and proactive • Professional scepticism. • Risk management.
effectiveness of controls established to address those risks. • Develop desktop procedures to clearly document business partners (finance and non-finance) to secure information to develop and confirm accounting outcomes Hands on and proactive • Professional scepticism. • Risk management.
management measures as well as the identified Security measures for the assigned applications Controls for scalable, distributed systems Security of AWS services, securing design of VPC architectures RESTful