competency candidate (+- 5 years)
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and
behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses. Ethical Hacking) experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions and Cloud assurance. Experience in security management, security and network architecture and/or design
responsible for keeping our company's and clients' IT secure and compliant by ensuring the reliability and efficiency enabling code to be validated for quality and security and deployed continuously. Responsibilities: Develop Implement and manage security testing tools and processes, including static application security testing (SAST) (SAST), dynamic application security testing (DAST), and container security scanning. Provide guidance and software delivery while maintaining code quality and security. Build automated deployments through the use of
(Electronic Security) to join our vibrant growing team. The Technician (Electronic Security) will perform required by our security department. The incumbent must provide technical support to the security department standards. The successful Technician (Electronic Security) will be well versed in CCTV systems, access control alarm systems. The Technician (Security Operations) will report to the Security Operations Manager. Key Responsibilities Experience Five (5) years' experience as an Electronic Security Technician Registered with SAIDSA for at least
application controls , general controls, access security, change control, configuration management, IT
service and security management (infrastructure security, network security, application security, information
information security, cloud security, data security as well as end user security)
• Build and manage relationships
Certification in CompTIA, Cisco, Microsoft, strong Cyber Security Principles, Linux, AD. Cloud platforms (AWS, Azure) IT environment: Hardware, software, networks, security and Telecoms. Manage projects, support users, technologies. Ensure the reliability, scalability, and security of all IT systems and infrastructure components configuration guides. Security and Compliance: Implement and enforce IT security policies, procedures
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration:
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration:
troubleshooting system-related issues and ensuring system security and availability. You will need Certifications design, implementation, and maintenance; system security concepts and protocols and cloud computing. DUTIES: customers. Maintain system security by monitoring system activity, implementing security policies and procedures procedures, and identifying and mitigating security threats. Ensure compliance with industry and organizational Experience with cloud computing. Knowledge of system security concepts and protocols. Advantageous – Bachelor's