Responsibilities Analyze information to identify security control and/or capability gaps that impacts the organization's knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure
Responsibilities Analyze information to identify security control and/or capability gaps that impacts the organization's knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure
testing. · Define, manage, and integrate security controls into IT infrastructure, oversee continuous continuous security improvements, and ensure a well-controlled and standardized IT security environment. · Oversee resources, take responsibility for IT security budget and cost control, and drive cost-effective measures and Governance § Cyber Security Management § IT Risk Management § IT Control Monitoring § Data Protection
investigation.
Centre for Internet Security (CIS) controls, standards, frameworks, benchmarks, etc
and investigation. Centre for Internet Security (CIS) controls, standards, frameworks, benchmarks, etc
future incidents. Implement and maintain security controls in accordance with industry best practices
Managed Talent Solution's client is looking for a Systems Engineer - Information Security for one of their clients based in Johannesburg. The Systems Engineer must have experience in design architecture, deployment, migration, administration, troubleshooting experience within the security field. Exp
Managed Talent Solution's client is looking for a Systems Engineer - Information Security for one of their clients based in Johannesburg. The Systems Engineer must have experience in design architecture, deployment, migration, administration, troubleshooting experience within the security field. Exp
Assist and support the implementation of security controls, threat protection etc for both the company
promptly to all information security incidents. Develop and sustain controls to ensure data and service