What you will be doing: Develop and maintain security architecture aligned with business goals and regulatory regulatory requirements. Conduct regular security reviews, risk assessments, and implement strategic strategic plans. Prioritise and adjust security initiatives based on risks, business needs, and evolving threats interventions, and enhance security policies, procedures, and technologies. Deploy security solutions and tools primary technical resource. Provide expert advice on security issues, managing incident response and prevention
infrastructure to ensure the highest levels of security for our clients. This role requires a proactive proactive approach to identifying potential security threats and implementing effective countermeasures while while proactively managing and enhancing the security posture of our client's organisation through continuous Objectives: Security Policies and Standards : Assist in developing and enforcing security policies, standards standards, and procedures. Security Incident Response : Assist in the investigation, analysis, and resolution
your career. General Role Description The Cyber Security Analyst is responsible for monitoring, detecting Responsibilities: Monitor and analyze security alerts from various security tools and information sources to incidents. Investigate suspicious activities, security breaches, and cyber attacks to determine their to identify security gaps and propose remediation strategies. Develop and implement security standards countermeasures to mitigate risks and enhance the overall security posture. Collaborate with cross-functional teams
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
growth Minimum 4 experience with networking, cyber, security and/or software sales Ability to work independently understanding of networks, (switches, routers, security, wireless, firewalls, etc.) and technology a required required, Good knowledge of bringing cyber security and access security solutions to market a plus, Network
growth Minimum 4 experience with networking, cyber, security and/or software sales Ability to work independently understanding of networks, (switches, routers, security, wireless, firewalls, etc.) and technology a required required, Good knowledge of bringing cyber security and access security solutions to market a plus, Network
development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery & development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery &
development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery & development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery &
ensuring system scalability, interoperability, and security. The IT Architect provides strategic direction hardware, software, networks, data management, and security components. Evaluate and recommend emerging technologies with security teams to ensure that architectural designs and implementations adhere to security best
can drive technological innovation, ensure the security and reliability of the company's systems, and reliability, security, and scalability of our card payment switching mechanisms and hardware security modules card payment switching mechanisms and hardware security modules Experience with terminal and Android software