overall IT operations environment, considering security, operational, and business requirements. Implement Vulnerability management framework with BU team KEY WORK OUTPUTS AND ACCOUNTABILITIES Provide domain overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched
in Johannesburg Fourways is looking for an IT Security Operations Analyst to join their dynamic team account lifecycle. You will be responsible for security administration and user provisioning to network and access revocations. Implement and maintain security roles / profiles and entitlements throughout the Develop and update access control lists. Process security authorization requests in accordance with operating reporting security solutions on endpoints. Assist with updating software with the latest security patches
by building relationships and partnerships with key stakeholders. Represent client requirements throughout diploma/certification (advantageous) Demonstrated use of Function Point measurement (advantageous) Experience in the use
strategy and capabilities. Manage Master data that is key to the business. Define data quality approach. Manage requirements for data quality, data lineage, data security, data privacy and other relevant aspects for business management improvements, set data quality, data security, data privacy, data issue remediation guidelines experience with data quality, data lineage, data security, data privacy, data lifecycle management, data
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
teams and key stakeholders Monitor project progress and address potential issues Act as the point of contact follow-up on feedback and solutions. Ensure that all key stakeholders stay informed and are considered when Organisational change management: understanding the key concepts and its importance in a project Solid organisation
by building relationships and partnerships with key stakeholders. Represent client requirements throughout diploma/certification (advantageous) Demonstrated use of Function Point measurement (advantageous) Experience in the use
QA Engineers to ensure that systems are safe and secure against Cybersecurity threats. Work with Software Influx DB, Dynatrace, Oracle, Postgres, Management of Keys, Certificates and Secrets Development: Java, Spring
testing. Test data management. Manual, Performance, security, and load testing. Any additional responsibilities Identification, Creation & Sanitation of Test Data Security and Reliability Testing. Technical Test Case creation
testing. Test data management. Manual, Performance, security, and load testing. Any additional responsibilities Identification, Creation & Sanitation of Test Data Security and Reliability Testing. Technical Test Case creation