standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you will for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you will for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: registration required 1 Year experience as a Security Guard in a Retail environment required Must reside in or
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to security incidents Responsible for assessing and securing the digital infrastructure effective counter measures. : Implement and manage security technologies and controls, including firewalls detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / protection, and security information and event management (SIEM) solutions Monitor security alerts and logs identify and investigate security incidents and indicators of compromise (IOCs) Security assessments, vulnerability vulnerability scans, and penetration tests to identify security weaknesses and gaps Develop and maintain incident response plans, procedures, and playbooks Implement security best practices and ensure the integrity, confidentiality
adventure of being a Client Experience Manager in security services. Your mission? To make sure customers service and handling all the ins and outs of our Security Services Department. Your Responsibilities: Picture are highly desirable. Your proficiency in the MS Office suite, including Power BI, is considered an added opportunities to grow and make a real difference in our Security Services Department. What you will receive: As
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: registration required 1 Year experience as a Security Guard in a Retail environment required Must reside in or
IT Compliance and Security Specialist (JB4361) Sandton, Gauteng R40 000 to R45 000 a month CTC Permanent industries is currently looking for a IT Compliance and Security Specialist to join their Team. Their products and sorting machines, electronic drop safes for retail establishments, coin sorting and sachet equipment IT Risk Assessments, networks, servers, cyber security, and general end user support. Candidate must must have knowledge of I.T. Operations, security, governance, frameworks, and a firm grasp of the below to
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document