optimize infrastructure, ensuring scalability, security, and optimal performance. Collaborate with development malfunctions, or outages. Ensure compliance with industry security standards and best practices throughout all infrastructure production related problems related to environments, compute, storage, backup and infrastructure Assist with understanding of computing concepts, including virtualization, storage, networking, and security. Proficiency Understanding of network protocols, firewalls and network security groups, load balancers, and VPN configurations
optimize infrastructure, ensuring scalability, security, and optimal performance. Collaborate with development malfunctions, or outages. Ensure compliance with industry security standards and best practices throughout all infrastructure production related problems related to environments, compute, storage, backup and infrastructure Assist with understanding of computing concepts, including virtualization, storage, networking, and security. Proficiency Understanding of network protocols, firewalls and network security groups, load balancers, and VPN configurations
of Linux and Unix systems to ensure top-notch security and optimal performance. Take the lead in setting promptly applying security patches and conducting daily system checks. Empower users with secure access through meticulous management of user permissions and regular security audits. Be the go-to expert for software installation experiences. What you need: A tertiary qualification in Computer Science or related field would be beneficial. Experience with server monitoring tools Knowledge of security patch management and system monitoring. Ability
and risk impact.
ns:
storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure operational resilience. IT Security and Compliance: Develop and enforce IT security policies, procedures, mitigate cybersecurity risks. Conduct regular security assessments and audits to identify vulnerabilities cybersecurity best practices and ensure a culture of security awareness. Strategic Planning and Leadership: Oversee the vendors Bachelor's degree/Diploma in computer science, Information Technology, or related field;
costs are captured on CRS system for the DG (Learnerships and Apprenticeships, DG Bursaries, EiT, TiT Initiating and coordinating the QALA for SETA Learnerships together with learners Feedback/reporting to
costs are captured on CRS system for the DG (Learnerships and Apprenticeships, DG Bursaries, EiT, TiT Initiating and coordinating the QALA for SETA Learnerships together with learners Feedback/reporting to
programming of a diverse range of products in the security and automation space. Remote options available Education: Degree/Diploma in Software Engineering or Computer Science Job Experience & Skills Required:
state-of-the-art artificial intelligence, and cyber security. With a new wave of highly anticipated projects