teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure operational resilience. IT Security and Compliance: Develop and enforce IT security policies, procedures, mitigate cybersecurity risks. Conduct regular security assessments and audits to identify vulnerabilities cybersecurity best practices and ensure a culture of security awareness. Strategic Planning and Leadership:
reliability while adhering to best practices and security standards. Design and Architecture: Collaborate reliability of cloud services. Security and Compliance: Implement security best practices and compliance for AWS environments. Configure and manage AWS security services such as AWS Identity and Access Management Management (IAM), AWS WAF, AWS Shield, etc. Conduct security assessments and audits, and remediate vulnerabilities pipelines, version control, etc.). Knowledge of security best practices and compliance standards for cloud
Python, business networks, cloud services, network security and virtualisation. Network Systems Administrator business networks, cloud services (AWS), Network security and virtualisation (Docker, VSphere, VirtualBox)
vulnerabilities and ensuring that their applications are as secure as a secret agent's identity.
Skills
gadgets to overcome obstacles
Prioritizing security measures, ensuring that software is as impenetrable
HRIS, analyzing data, ensuring data integrity and security, and collaborating for system enhancements. Key statistical analysis, ensuring data accuracy and security, conducting audits, and staying updated on HRIS for stakeholders, maintaining data accuracy and security, and collaborating with cross-functional teams Advanced proficiency in database management and security, as well as running SQL queries Ability to keep
optimize infrastructure, ensuring scalability, security, and optimal performance.
tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial presentation Technical experience in the information security domain would be beneficial. Knowledge and Skills:
information systems, ensuring they are up-to-date and secure. Collaborate with IT and system administrators permissions within the systems to ensure data security and compliance. Assist in creating and revoking System Security: Ensure that all supported systems are secure and up-to-date, with no security breaches
are as resilient as Vibranium. From routing to security, you'll ensure our networks stand strong against Proficiency in configuring and managing network security appliances, ensuring our defenses are impenetrable Clearance Level: Fury: Ability to obtain and maintain security clearances, because secrets are meant to be kept