as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Role • The primary role of the Data Protection Officer is to ensure that all data subjects (data from bonus. • An understanding of modern information security methodologies and standards, especially in a Hybrid
RTB002425-WHN-1 We are recruiting a Chief Technology Officer for Gauteng Area PURPOSE The position will be responsible Implementation Strategic management of the Office of the Chief Technology Officer (OCTO) division in order to ensure regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
Implementation Strategic management of the Office of the Chief Technology Officer (OCTO) division in order to ensure regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
world. The primary role of the Data Protection Officer is to ensure that all data subjects (data from bonus. An understanding of modern information security methodologies and standards, especially in a Hybrid
If youve worked for companies across various industries, then you probably know how different environments can make or break your enjoyment in any role. Thats why this opportunity is not one to be missed!
A thriving digital tech company in Pretoria is seeking a skilled Senior C# Dev
optimizing internal tools and flows, and ensuring security and processes for development and cloud infrastructure reusable code.
day administration. • Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. • Maintains the business-as-usual activities Licensing, Reporting, troubleshooting. • Microsoft Office 365 - Teams, SharePoint, Exchange Administration software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access desktop/notebook hardware and software. Support Microsoft Office 365 Applications Support Windows OS. Manage Printers system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows