QUALIFICATIONS System Administration Servers Security background Security updates Managing devices and what tools Linux, GNU, UNIX, Fedora, MAC, Android Microsoft Security Patches ABOUT US EXL is the indispensable partner QUALIFICATIONS System Administration Servers Security background Security updates Managing devices and what tools Linux, GNU, UNIX, Fedora, MAC, Android Microsoft Security Patches ABOUT US EXL is the indispensable partner
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against incumbent will require a suitable Degree/Diploma with 10 years' work experience in a technical hands-on administrative Implement effective security controls to protect against threats. Develop Information Security policies to guide
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment
Cyber Security Engineer, the main purpose of the role will be to support the Group Cyber Security Manager Manager to develop cyber security strategies, create awareness of cybersecurity, execute against strategic tactical roadmaps, and give security operational support. The Senior Cyber Security Engineer will use their cyber defence systems against a range of cyber security concerns across the company's IT, OT and Cloud experience in cyber security engineering or architecture roles 3 years' experience in securing operational technology
Description Responsibilities/Tasks: ·Implementing code that can be reused on multiple platforms ·Breaking implement new requirements. ·Refactor and improve the code to keep the product maintainable and adaptable to the changes, including debugging other people's code, making changes to test data, etc. ·Provide guidance or Computer/Engineering Sciences and/ or at least 10 years relevant experience as a developer as part for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge of how these