Sales Representative required for established security manufacturer and installer based on the west rand marketing experience in Access Control, Biometrics, Security Systems and /or gate automation and/or access
Finance Industry is urgently looking to employ a Securities Services Analyst on a Fixed Term 12-month contract Requirements: 1-2 years practical work experience in Securities Services University degree Excellent written
Delmas area for an energetic, can-do approach Security Manager to join their team. • Drivers license
Xcede We have a current opportunity for a DDOS Security Engineer on a permanent basis. The position will
skilled and experienced Head of Security to oversee all aspects of our security operations. The ideal candidate managing comprehensive security strategies to ensure the safety and security of our personnel, assets
/>
Security & Investigation Officer Required for a reputable company based in
experience in security and investigations
Reference: JHB000097-KC-1 As a Security Manager, you will be responsible to oversee the safety and protection protection of various mining sites. Implement security protocols, conducting risk assessments, coordinating coordinating with law enforcement, and training staff on security procedures. Key Responsibilities: Maintaining rendering of security service deliver in line with SOP's Ensuring compliance and that all security officers services General management and supervision of security staff and operations, including rosters and posting
maintain security measures against breaches, viruses, and spyware.
- Upgrade systems with security controls
control structures.
- Establish standardized security processes.
- Ensure proper configuration
/>- Collaborate across departments to resolve security issues.
- Conduct IT risk assessments.
qualified Information Security Officer who will be responsible for the security necessary to support business which include: Development and Implementation of Security Policies and Procedures Develop, implement, and and maintain the company's information security policies and procedures Ensure these policies comply with regular risk assessments to identify potential security vulnerabilities Develop and implement risk management Response: Lead and manage the response to information security incidents Develop and maintain an incident response