on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This is at the heart of our security operations, offering the chance to shape security architecture, deploy with clear data driven results for use during security assessments, incident analysis and root cause Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes. Monitor networks and connected devices for security issues. Proactively respond to and report on DLP
Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management strategic, comprehensive enterprise information security and IT risk management program to ensure that Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements:
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Reference: CPT005197-GP-1 Cybersecurity Engineer Secure your future with this giant in the aerospace and IT/Computing (or demonstrated equivalent work experience) Security Higher certifications in the flowing key vendors…
Description Join Our Team at Gridhawk Security Gridhawk Security is seeking a dedicated Sales Representative response contracts. If you're passionate about security sales, excel at building relationships, and thrive Overview: As a Sales Representative at Gridhawk Security, you'll be instrumental in selling armed response will directly contribute to our success in the security industry. Key Responsibilities: Sales Generation: Experience: Minimum of 2 years' experience in security sales, specifically armed response and alarm systems
Reference: PE010794-Podu-1 Cyber Security Specialist Key Roles and Responsibilities: Determine who requires & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them. Good working knowledge of various security technologies such as network and application firewalls
PE010796-Tabz-1 Our client is looking for a Cyber Security Specialist for a 12 month contract based in the & Plan, coordinate, and implement information security programs. Determine who requires access to which & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various
& Plan, coordinate, and implement information security programs.