company objectives Monitoring and maintaining networks and servers Implementing security protocols and computer science, information technology, information systems, or similar with basic networking knowledge Excellent computer science, information technology, information systems, or similar with basic networking knowledge Experience: IT systems, networks, Microsoft on prem and cloud-based systems and related technologies Salary: Market your application as unsuccessful. All personal information received will be processed in accordance with
/>
DegreeRelevant tertiary qualification in Information technology and Minimum of 8 years of experience in risk, controls, and compliance management in a technology environment 8 years' of experience in IT Audit management in a Cyber or technology environment Knowledge of common information technology management / compliance requirements, such as Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data protocols; firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware
with all security-related tasks. Maintenance of information security systems, anti-virus clients and servers take steps to mitigate additional risks to the network and services. Enforce security policies and standards for security and auditing purposes. Audit the network's existing systems. Develop and document standard 12 (Matric) - Tertiary qualification in Information Technology or related - Cyber Security Certification security-related functions: Firewalls, VPNs and IPS technology and administration DNS and DNS Security and administration
accreditation Network key relationships - Engage with and provide support to the established network of internal Build work-related network and share knowledge with colleagues -Building networks -Ownership: Make critical Suite -Data modelling and evaluation -Computer Technology Skills -Communication Skills -Business Writing Qualifications Information Technology related degree and certification on relevant Information Technology systems
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / / IPS), endpoint protection, and security information and event management (SIEM) solutions Monitor security integrity, confidentiality, and availability of information assets Conduct security awareness training to procedures Conduct penetration tests on systems, networks, and applications to identify security weaknesses and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service
responsible for designing, implementing, and optimizing network transmission systems to ensure efficient and reliable leadership, guidance, and mentorship to a team of network transmission architects. Foster a collaborative the design, development, and implementation of network transmission systems. Collaborate with cross-functional Degree in a technical field. Proven experience in network transmission engineering, with a focus on design experience. In-depth knowledge of network transmission technologies, protocols, and standards, such as
applications made possible by information and communication technology - Compile comprehensive documentation accreditation Network key relationships - Engage with and provide support to the established network of internal applications made possible by information and communication technology -Compile comprehensive documentation Build work-related network and share knowledge with colleagues -Building networks Knowledge -Knowledge making skills -Communication Skills -Computer Technology Skills -Task Management -Adobe Creative Suite
candidate will have an in-depth understanding of Network protocol and low latency speed.Â
As the current-state and future-state Linux based infrastructure technology solutions and innovations meet the standards "trade-off analysis" of alternative technologies when recommending solutions, ensuring they fit value delivery to internal stakeholders by staying informed on updates, upgrades, and discontinuations of functional requirement/ specification documents for technology solutions that meet the intended business requirements