tool
to join our team in the Computer & Network Security industry. As a Mid Tier Consultant, you will play
guidance and support to our clients in optimizing and securing their mid-tier application layers. This is a challenging
understand their mid-tier application requirements and security objectives
Design, develop, and implement
solutions that meet clients'' security needs
Perform security assessments, vulnerability scans
mid-tier applications
Identify and recommend security enhancements and best practices for mid-tier application
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (Min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills: Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance Compliance Cyber Security Monitoring Personal Attributes: Action orientated - Contributing independently Decision
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune Management:
4. Security and Compliance:
Personal Assistant: Security Industry Industry experts in the Security (Access Control) sector are looking Requirements: 1-2 years working experience in the security industry (NON-NEGOTIABLE) A secretarial qualification