is currently looking for a Cyber Safety & Security Engineer within the Digital Technology Department to identify security control and/or capability gaps that impacts the organization's security posture Provide reviews and actively lead the discussions from a security standpoint Create formal written documentation patches for discovered vulnerabilities; assist security, server management, desktop, private/public cloud when necessary. Expand the use of automation in securing the environment and across multiple technology
industry trends, emerging technologies, and vendor solutions to effectively evaluate and recommend new and Delivers the high-level Solutions Architecture design and the detailed Solutions Architecture design. Participates
System Security Engineer
Reporting to both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive IT staff, budgets, and resources. Ensuring the security and integrity of the university's IT systems, and contracts and ensuring that IT services and solutions meet the university's needs and standards. Providing other industry best practices. These include data security, privacy and other legal considerations that accompany appointment: The position of Chief Information Officer is a 5-year contract appointment with an executive-level
JNB007799-LD-1 About the role: The Chief Operating Officer is a strategically focused position that will provide ensure timely and high-quality delivery of SaaS solutions to clients Collaborate closely with product management implementation of new technology and innovative solutions that can enhance operations, streamline processes
Reporting to both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive IT staff, budgets, and resources. Ensuring the security and integrity of the university's IT systems, and contracts and ensuring that IT services and solutions meet the university's needs and standards. Providing other industry best practices. These include data security, privacy and other legal considerations that accompany appointment: The position of Chief Information Officer is a 5-year contract appointment with an executive-level
Africa is looking for an Azure Infrastructure and Security Specialist to join their dynamic team. Use health up to date about security risk and mitigations to constantly strengthen the security Active participation implementation of Active Directory security concepts and IT Security Solutions in Azure Advanced network knowledge Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Defender products products and Active Directory security best practices. Should you not receive a response within 14 days, please
The IT Hub South Africa provides innovative IT solutions globally, specializing in Development and Operations and extended support, delivering successful IT solutions worldwide. ESSENTIAL SKILLS REQUIREMENTS: - IT enterprise IT network know-how, including network security (firewalling) - Container-based application virtualization Experience with IT orchestration & automation solutions (e.g., Rundeck, Ansible) - Skills in further programming enterprise IT network know-how, including network security (firewalling) WHAT WILL BE YOUR ROLE AND RESPONSIBILITIES
assistance to users of Operational Technology solutions and services within Global IM for the various effectiveness. Conduct risk assessments for proposed changes. Identify potential risks and implement mitigation is completed and documented. Identify potential risks associated with service introduction and develop develop mitigation strategies. Monitor and manage risks throughout the service introduction process. Ensure Ensure compliance with regulatory and security requirements. Develop and maintain documentation related to
assistance to users of Operational Technology solutions and services within Global IM for the various effectiveness. Conduct risk assessments for proposed changes. Identify potential risks and implement mitigation is completed and documented. Identify potential risks associated with service introduction and develop develop mitigation strategies. Monitor and manage risks throughout the service introduction process. Ensure Ensure compliance with regulatory and security requirements. Develop and maintain documentation related to