skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions instructions and support team members in achieving common security objectives. Flexibility and Availability: Willingness
Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions instructions and support team members in achieving common security objectives. Flexibility and Availability: Willingness
service and security objectives, by maintaining sustainable and effective service and security monitoring investigation and remediation of service and security issues.     Â
contribute to making this security solutions company a safer and more secure company for all their clients company is a leading security company dedicated to providing top-notch security services to their clients financial management role, preferably within the security industry In-depth knowledge and experience with
provide a mitigating methodology to ensure data security. Your key responsibilities will include, but is recommendations for enhancing IT controls and security measures, aligning with organizational goals and stakeholders. Data Security Assessment and Enhancement: Assess the effectiveness of data security measures comprehensively classification. Provide achievable recommendations to secure data security strength and mitigate potential vulnerabilities process. Minimum 3 years managing a team. Cyber security experience Financial Services experience Kindly
to making SecureGuard Solutions a safer and more secure company for all their clients Job & Company company is a leading security company dedicated to providing top-notch security services to their clients financial management role, preferably within the security industry In-depth knowledge and experience with
to making SecureGuard Solutions a safer and more secure company for all their clients Job & Company company is a leading security company dedicated to providing top-notch security services to their clients financial management role, preferably within the security industry In-depth knowledge and experience with
enterprise IT network know-how, including network security (firewalling) - Container-based application virtualization enterprise IT network know-how, including network security (firewalling) WHAT WILL BE YOUR ROLE AND RESPONSIBILITIES (technical requirements as well as process or IT security governance requirements) - Go-live preparation