looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations operations in the Western Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities vulnerabilities - Monitor and analyze security trends and incidents to identify areas for improvement
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment
financial services industry is looking for a SAP Security Specialist to join their dynamic company. As a permissions) and ECC HR Security Specialist, you will be responsible for providing security support within the action to reduce risk on the systems. Provide SAP Security support skills to business end users and team of remediation. Manage projects within the SAP Security area. Be responsible for coordination and managing Systems or related would be beneficial. SAP System Security and Authorizations or SuccessFactors certification
the Group's security posture through proactive analysis and mitigation of cyber security threats and a team to implement security assessments, measures and processes through security engineering, penetration environment against cyber security threats. JOB OBJECTIVES § Build an application security and penetration testing and manage a team of cyber security specialists in performing security assessments and penetration testing organization's cyber security strategy, policies, processes and tooling for continued security improvements.
Cyber Security Manager to shape, design and manage the implementation of the Group's cyber security strategy Accountable for the organization's cyber security systems and security of infrastructure as well as the organization's types of data breaches. · Assess IT security needs, align cyber security initiatives with business objectives organization's cyber security strategy and roadmap. · Establish and enforce cyber security governance, policies improve cyber security incident response plans, lead and coordinate the response to security incidents,
Certified Network Professional (CCNP) Security Engineer looking for an exciting opportunity motivated individual to join our team. As a CCNP Security Engineer, you'll play a crucial role in designing designing, implementing, and managing secure network infrastructures for our clients.
What
Network Security.
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and