/>- Design, install and manage security mechanisms that protect the company's network
Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining
Develop and implement standardised Information Security processes and procedures;
- Respond to internal
to ensure compliance and correction of all IT security issues;
- Conduct IT risk assessments;
- Research, plan, and implement information security technical solutions to meet business requirements
to plan, manage, and administer the CMS network security as well as ensure all network components are managed qualification at NQF level 6 » A minimum of five (5) years' experience in IT governance and security » Certifications Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will be an added advantage » Knowledge of Patch Ops Manager); Azure Active Directory;and Cloud Security
manage, and administer the company's network security. Ensure all network components are managed in ensure compliance. •Design, install and manage security mechanisms that protect the business' network •Upgrade systems by implementing and maintaining security controls. •Protect the system by defining access •Develop and implement standardised Information Security processes and procedures. •Respond to internal qualification at NQF level 6. •A minimum of five (5) experience in IT governance and security. •Certifications
plan, manage, and administer the client's network security. Ensure all network components are managed in ensure compliance. Design, install and manage security mechanisms that protect the clients's network Upgrade systems by implementing and maintaining security controls; Protect the system by defining access Develop and implement standardised Information Security processes and procedures; Respond to internal to ensure compliance and correction of all IT security issues; • Conduct IT risk assessments; Assist
Technical Information Security positions
IT Compliance and Security Specialist (JB4361) Sandton, Gauteng R40 000 to R45 000 a month CTC Permanent currently looking for a IT Compliance and Security Specialist to join their Team. Their products cover IT Risk Assessments, networks, servers, cyber security, and general end user support. Candidate must must have knowledge of I.T. Operations, security, governance, frameworks, and a firm grasp of the below to possess firm knowledge of Microsoft Baseline Network Security v1.5, Microsoft patch management, user administration
unauthorized access or leakage of sensitive information. Secure databases, including access controls, encryption monitoring and responding to security events related to data. Implement secure methods for transferring files field. Proven experience in roles related to data security, data management, or cybersecurity. Knowledge Strong communication skills for conveying data security concepts to technical and non-technical stakeholders and problem-solving skills for addressing data security challenges. Ability to collaborate with IT teams
highly skilled Cyber Security Principal Lead/Specialist to oversee their cyber security strategies and initiatives should have a deep understanding of cyber security practices and trends and possess the leadership skills effective and comprehensive cyber security programme. The principal lead/specialist must be able to influence influence and broker conversation with executive level stakeholders to address cyber risk in a financial services proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting
Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite Fulltime) & Plan, coordinate, and implement information security programs.
& Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls knowledge of information security management and policies Sound understanding of security operational processes