Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
Recruitment Division at Tych. Responsibilities: Secure new business through to grow the division and gain with disabilities and learners/interns and grads secure employment The role is well suited for someone
Recruitment Division at Tych. Responsibilities: Secure new business through to grow the division and gain with disabilities and learners/interns and grads secure employment The role is well suited for someone
workflows within Azure DevOps. Security Awareness: An understanding of Security practices to ensure that Development Development processes align, with Security requirements. Documentation Skills: The ability to document
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior
identification of client requirements through to securing or renewing the contract. The Proposal & Business stakeholders. Conduct team briefings once deals have been secured. Bachelor's degree in a related field. Minimum
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior