skilled and experienced Head of Security to oversee all aspects of our security operations. The ideal candidate managing comprehensive security strategies to ensure the safety and security of our personnel, assets
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to security incidents Responsible for assessing and securing the digital infrastructure effective counter measures. : Implement and manage security technologies and controls, including firewalls detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / protection, and security information and event management (SIEM) solutions Monitor security alerts and logs identify and investigate security incidents and indicators of compromise (IOCs) Security assessments, vulnerability vulnerability scans, and penetration tests to identify security weaknesses and gaps Develop and maintain incident response plans, procedures, and playbooks Implement security best practices and ensure the integrity, confidentiality
adventure of being a Client Experience Manager in security services. Your mission? To make sure customers service and handling all the ins and outs of our Security Services Department. Your Responsibilities: Picture opportunities to grow and make a real difference in our Security Services Department. What you will receive: As
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
not limited to: Property Protection: Ensure the security and safety of the Companies premises, including theft. Emergency Response: Respond promptly to security incidents, emergencies, or alarms, taking appropriate Customer and Employee Safety: Maintain a safe and secure environment for customers, employees, and visitors and Documentation: Maintain accurate records of security incidents, observations, and daily activities Clear criminal record. Must have a PSIRA (Private Security Industry Regulatory Authority) valid certificate
/>- Design, install and manage security mechanisms that protect the company's network
Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining
Develop and implement standardised Information Security processes and procedures;
- Respond to internal
to ensure compliance and correction of all IT security issues;
- Conduct IT risk assessments;
- Research, plan, and implement information security technical solutions to meet business requirements
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal