are seeking a Security Analyst to join our team. As a Security Analyst, you will play to maintain confidentiality, integrity, and availability of data and systems.
Â
What
consoles
IT Network Security sustainability Creation and maintenance of the enterprise's security architecture architecture design and all security and network projects Enforce policies, procedures and associated plans for system security. Design and implement disaster recovery plans and assess a need for any security reconfigurations acquire additional security solutions, Recommend, schedule, and perform security improvements, upgrades upgrades. Deploy, manage and maintain all security systems i.e firewalls, anti-virus software, intrusion detection
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
BUSINESS UNIT: ICEBOLETHU SECURITY SERVICES ICEBOLETHU GROUP: HEAD OFFICE - DURBAN REFERENCE NUMBER: provider of dignified burial solutions. Icebolethu Security Services, a subsidiary Icebolethu Group is currently currently in search of a General Manager: Security Services, the successful incumbent will be responsible responsible for overseeing and managing all security-related operations and business within the Group. This role experience in security management, policy development, and leading teams. The General Manager: Security Services
of all technical security areas, including but not limited to cyber and data security. The purpose of of this role is to ensure ICT security integrity and provide technical support. The ideal candidate will will hold a Certified Information Security Manager (CISM) certification, with Certified Ethical Hacker Information System Security Professional (CISSP) credentials. Experience in cyber security awareness and training with over 5 years of experience in information security. RESPONSIBILITIES : Responsible for the implementation
Reference: Pta002867-EP-8 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
services of a Security Manager to join their team ROLES AND RESPONSIBILITIES Ensure that all security risks have leading practices Conduct ongoing assessments of security procedures and practices to enable effective mitigation effective deployment, management and utilization of security systems and technology to minimize risk Develop §Investigate all on-site crime related incidents Ensure security of product on trucks leaving the mine Provide relevant security related legislation/policies/procedures Experienced in managing security on a mine
databases, ensuring their performance, availability, and security. The role requires a blend of technical in maintaining the integrity, performance, and security of the company's databases. They are expected issues, optimizing performance, and ensuring data availability. The role requires both independent work and and efficiency. Data Security and Backup: Implement and maintain database security measures to protect recovery plans, ensuring data integrity and availability. Data Integration and Migration: Design and
databases, ensuring their performance, availability, and security. The role requires a blend of technical in maintaining the integrity, performance, and security of the company's databases. They are expected issues, optimizing performance, and ensuring data availability. The role requires both independent work and and efficiency. Data Security and Backup: Implement and maintain database security measures to protect recovery plans, ensuring data integrity and availability. Data Integration and Migration: Design and
development. You will have strong networking and security and ideally voice technology experience, ideally communications. Strong understanding of network security principles and best practices, including firewall connectivity issues, performance problems, and security vulnerabilities promptly and efficiently. Analyze problems and implement effective solutions. Availability for occasional travel to client sites and participation