Enrolling users and maintaining system security. Controlling and monitoring user access to the database
Ensure proper data access, permissions, and security controls Collaborate with cross-functional teams to
Responsibilities Analyze information to identify security control and/or capability gaps that impacts the organization's knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure
Responsibilities Analyze information to identify security control and/or capability gaps that impacts the organization's knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure
safeguarding data confidentiality with role-level security controls.
knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure
Paracon Key Responsibilities Monitors, investigates and reports on information security incidents, Internet use and ICT policy breaches. Perform proactive vulnerability assessments and assist with managed Security Operations Centre tasks. Conducts analyses and investigation of alleged breaches of In
Our Client a Global Tech firm is seeking a 2 Cisco Network engineers to join their team in Johannesburg on a contract basis. They offer stability, growth, attractive rates and a great working environment.
Want to be a part of our team?
A Network Engineer is a seasoned
Our Client a Global Tech firm is seeking a 2 Cisco Network engineers to join their team in Johannesburg on a contract basis. They offer stability, growth, attractive rates and a great working environment. Want to be a part of our team? A Network Engineer is a seasoned technical professional responsi
Implement security best practices for the cloud environment. Ensure data encryption, access controls, and