at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop
similar role, with a proven track record in cloud security
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations operations in the Western Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities vulnerabilities - Monitor and analyze security trends and incidents to identify areas for improvement
Manager with expertise in Cyber Security to join our team. The successful candidate driving sales, and promoting our Cyber Security solutions.
What you’ll do: do:
The Cyber Security Account Manager plays a pivotal role in fostering strong, long-lasting Vendors, such as Mimecast's email and data security services.
This position focuses on understanding relationships with a portfolio of Mimecast and Cyber Security Clients.
Manager: Security Operations, the successful incumbent is accountable to provide physical security services Control all security registers. Investigate security breaches and compile reports. Undertake security threat measures. Develop post orders for security personnel. Monitor a security-guarding contract. Reporting Contribute and/or inform management decisions. Event Security Coordinate security services during Board/ ministerial meetings necessary. Coordinate security during RAF approved offsite events. Supervise contract security during RAF events
We are looking for a competent Security Supervisor to undertake the surveillance of our premises and
vandalism, thefts, or other criminal behavior.
A security officer must be well-trained in surveillance and
/>Remove wrongdoers or trespassers from the area.
Secure all exits, doors, and windows after end of operations
experience as security officer or guard
Knowledge of legal guidelines for area security and public
/>Trained in self-defense.
Registered as a security officer.
If you feel you have what it takes
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations operations in the Western Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities vulnerabilities - Monitor and analyze security trends and incidents to identify areas for improvement
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment