Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: PSIRA registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
& Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls knowledge of information security management and policies Sound understanding of security operational processes
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Good understanding of networking and network security is a must; knowledge of cryptographic principles
/>- Good understanding of networking and network security
- Systematic and analytical approach to problem
Responsible for analysing security events across the technology estate. Proactive vulnerability identification identified IT security related issues. To help enhance and maintain reporting on all security operations information security and regulatory compliance. Monitor networks and connected devices for security issues Investigate relevant cyber security incidents. Aid in the documentation of security breaches and provide remediation remediation recommendations. Assess security incidents and measure organisational impact. Work with IT
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis