Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that Understanding of AWS security. Excellent IT skills, including knowledge of computer networks, operating systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls
You will be responsible for ensuring the smooth operation of IT systems, implementing technology solutions mindset to drive innovation and efficiency in IT operations. The successful incumbent must possess a Bachelor's Ensure the security, reliability, and scalability of IT infrastructure to support business operations and compliance and ensure operational resilience. IT Security and Compliance – Develop and enforce IT security policies and controls to protect sensitive data and mitigate Cybersecurity risks. Conduct regular security assessments
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships. Promotes a culture of security awareness among employees through training, education address and mitigate security incidents. Ensures compliance with relevant security regulations, laws, and
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships.
of computer hardware, software applications, operating systems (Windows, macOS,), and networking concepts;