Architecture components of workstream B) Cloud Security Posture Management (CSPM) - onboarding, remediation workstream (same resource as A) above C) SbD Cloud Security Assurance Improvements workstream 1 x Resource as A) above D) DevSecOps workstream Container Security workstream 1 x Resource required to support and above E) CSB/CSB workstream related to cloud security controls 1 x Resource required to support and above F) IB (International Business) Big Data Security 1 x Resource required to support and steer Architecture
Cyber Security Solution Architect (Midrand) 2023/12/11 Reference Number LT-201 Description Role Purpose and or diverse security requirements. This includes security adoption plans, security architecture and design, responding to tenders, enabling cyber security resiliency using solutions that consider best situational awareness, learning and evolving. Security Solution Architects further guide architecture architecture discussions and the deployment thereof in security environments. Lastly, they provide hands-on business-oriented
Security Architect Manager Location: Midrand, South Africa About Accenture Accenture is a leading global deliver digital solutions and transformation. Security Architect Are you ready to be part of a transformational a talented Security Architect who will play a crucial role in providing technical security advice and guiding them towards security best practices. Responsibilities Providing security advice, requirements ensuring that security is integrated into the development process from the outset. Performing security-focused
Bachelor's degree in computer science, information security, or a related field (or equivalent experience) Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager information security roles, including network security, system security, or application security. Strong Strong knowledge of security technologies, protocols, tools, risk management principles and methodologies. automation and analysis. Familiarity with cloud security concepts (e.g., AWS, Azure, Google Cloud). Excellent
hire the services of an Independent Contractor Security Network Engineering Lecturer at our Midrand campus qualifications required: Masters Degree in IT (Security and Network Engineering) Experience: Relevant
Reference: JHB002467-TR-1We are recruiting for a IT Security Specialist Consultant. Assist with configuration for proper security reporting in theenvironment.- Review the audit findings report on security and advise potentialsecurity threats.- Identifying possible security threats and determining the best securitymeasures securitymeasures.- Suggesting improvementsto existing security systems.- Assess an organization's IT infrastructure current references for the provision of Information Security services in the last 5 years.- Minimum 3 years
hire the services of an Independent Contractor Security Network Engineering Lecturer at our Midrand campus
CONTROL ROOM OPERATOR (SECURITY)We are a leading company in the security industry that strive for service attitude support our mission in being the BEST security company in SA.We require the services of a Control minimum experience in a Security Control Room Knowledge of CCTV and Security Alarm equipmentSKILLS &
domain speciality for Cloud, Hosting and Cyber Security solutions. To define product strategy to support uplift of ‘Cloud’ (IaaS, SaaS, PaaS) and ‘Cyber Security’ services, inclusive of capabilities, technology the maturity curve of Cloud, Hosting and Cyber Security services. Own and manage a matrix of commercial SPOC for all markets for Cloud, Hosting and Cyber Security. Interface between OPCO’s, Group and vendors. hosting, productivity software, collaboration, cyber security & digital platforms. Experience working with
experience within SAP systems security hardening. Strong understanding of SAP security concepts and experience experience with SAP security tools and technologies. Monitor for and Investigate Security Breaches and test for for Vulnerabilities. Maintain security posture for enterprise applications such as SAP S/4HANA. Knowledge quality, on time and accuracy. Ensure systems are security compliant. Manage annual penetration testing exercise Ability to perform security remediation. Apply and perform impact analysis on SAP Security Notes released