Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
hardware analysis and the contribution to the security of their systems. Your background in system administration hardware components to ensure their integrity and security. • System Administration: Utilize your MS Server server systems, ensuring optimal performance and security. • Cloud Infrastructure Management: Assist in reliability, and security. • Network Security: Implement and maintain network security measures, including senior analysts and other team members to identify security vulnerabilities and develop strategies for mitigation
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
Industry is looking for an Azure Infrastructure and Security Specialist(senior) if you meet the below requirements implementation of Active Directory security concepts and IT Security Solutions in Azure · Advanced network systems like Git · Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Microsoft Defender products and Active Directory security best practices · Teamwork and strong internal and
Operations team, ensuring the seamless functioning and security of our IT Infrastructure, Systems and Applications practices to streamline IT operations. Bolster network security, fortify the Service Desk, and refine IT systems continuity and resilience. IT Infrastructure and Security Management: Direct the management of the company's platforms. Ensure the availability, scalability, and security of the IT infrastructure. Monitor network configurations and swift troubleshooting. Implement and enforce security measures such as firewalls, encryption protocols
Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices meet the organization's requirements in terms of security, performance, scalability, and cost-effectiveness background in areas such as networking, databases, and security, as well as experience with cloud platforms and
ensuring their performance, availability, and security. The role requires a blend of technical expertise in maintaining the integrity, performance, and security of the company's databases. They are expected and efficiency. Data Security and Backup: Implement and maintain database security measures to protect