highly experienced General Manager: Technology Security to join their team in Roodepoort, Johannesburg developing and implementing a comprehensive technology security strategy and framework, including developing and Organisation's technology security, together with proactively implementing security measures and controls Develop and implement a comprehensive technology security strategy and framework for the Organisation, aligned aligned with the Group's Information Security strategy. Oversee the development and implementation of
Description Cyber Security Specialist required on a Fixed Term Contract in Midrand to oversee and manage lending sector. A Deep understanding of cyber security practices and trends as well as leadership skills maintaining an effective and comprehensive cyber security program. Requirements: DegreeRelevant tertiary and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. 5 years' approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to VFS
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and
highly skilled and experienced Engineering Lead: Security to join our client on a 12-month renewable contract Collaborate with cross-functional teams to identify security needs and develop solutions Develop and implement to improve the overall security posture of the company Conduct regular security assessments and audits remediation plans Stay up-to-date with the latest security trends, technologies, and best practices Manage industry standards and regulations related to security Qualifications: Bachelor's degree in Computer
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
our clients' security postures. - Assist in the development and implementation of security measures to assessments and penetration testing. - Analyze security breaches to identify the root cause and implement development of security policies, procedures, and guidelines. - Assist in the creation of security awareness - Knowledge of security frameworks and standards - Familiarity with various security tools and technologies
rience with security standards and their implementation
to join our team in the Computer & Network Security industry. As a Mid Tier Consultant, you will play
guidance and support to our clients in optimizing and securing their mid-tier application layers. This is a challenging
understand their mid-tier application requirements and security objectives
Design, develop, and implement
solutions that meet clients'' security needs
Perform security assessments, vulnerability scans
mid-tier applications
Identify and recommend security enhancements and best practices for mid-tier application
hardware analysis and the contribution to the security of their systems. Your background in system administration hardware components to ensure their integrity and security. • System Administration: Utilize your MS Server server systems, ensuring optimal performance and security. • Cloud Infrastructure Management: Assist in reliability, and security. • Network Security: Implement and maintain network security measures, including senior analysts and other team members to identify security vulnerabilities and develop strategies for mitigation