The purpose of an Information Security Analyst role is to safeguard the organisation's information systems implementing and monitoring security measures, investigating potential security incidents to protect our our systems, networks and data. The Information Security Analyst contributes to maintaining compliance with relevant regulations, identifying and mitigating security risks, and ensuring the confidentiality, integrity information. KEY PERFORMANCE AREAS (KPAS) KPA 1 Security Monitoring and Incident Response 1.1. Monitor
The purpose of an Information Security Analyst role is to safeguard the organisation's information systems implementing and monitoring security measures, investigating potential security incidents to protect our our systems, networks and data. The Information Security Analyst contributes to maintaining compliance with relevant regulations, identifying and mitigating security risks, and ensuring the confidentiality, integrity information. KEY PERFORMANCE AREAS (KPAS) KPA 1 Security Monitoring and Incident Response 1.1. Monitor
ensuring compliance and deadlines are met. Internal Security Compliance Frameworks (ATSG) Assist with development and Remediation Testing of previously performed Security Assessments and Internal Audits Test the remediation Cyber Security Incident Response Experience and knowledge of Information Technology and IT Security. Successfully
are looking for a capable System Security Engineer, who enjoys security work and possesses both deep and and wide expertise in the security space. You will make things more secure by protecting system boundaries attacks and securing highly sensitive data. Qualified candidates will have a background in Security or Systems Responsibilities Engineer, implement and monitor security measures for the protection of computer systems Identify and define system security requirements Design computer security architecture and develop detailed
Cyber Security Officer to assist in identifying and mitigating security risks, analyzing security data data, and implementing security measures. You will have the opportunity to learn from experienced professionals are to: Assist in monitoring security systems and responding to security incidents. Conduct vulnerability vulnerability assessments and penetration testing. Analyse security data to identify trends and potential threats implementation and maintenance of security controls. Participate in security awareness training and initiatives
is looking for a security guard to be responsible for ensuring the safety and security of employees, property patrolling assigned areas to detect and prevent security breaches. Using surveillance equipment, such as Checking the credentials of individuals entering a secured area. Monitoring entrances and exits to prevent Communication: Maintaining communication with other security personnel and relevant authorities. Providing Deterrence of criminal activity through a visible security presence. Reporting suspicious behavior or activities
We have an exciting opportunity for a Cyber Security Analyst with one of our legal firms.
Requirements:
their team and contribute to the development of secure software solutions while ensuring compliance with requirements. This role will primarily focus on Secure Software Development (SGD) and contribute to enhancing Cybersecurity Environment. Familiarity with DevSecOps (Secure Dev Ops) practices. Minimum 5 years of software Operating Systems. Understanding of DevSecOps (Secure Dev Ops) principles. Qualifications: BEng in Computer
Electronic Security Systems, such as CCTV, Access Control, Perimeter and Intruder detection and security software
please consider your application unsuccessful IT Security and GRC Manager Location: Johannesburg, Gauteng framework that provides assurance that information security and strategies are aligned with and support business critical technical and leadership-oriented IT security certifications, such as CISA, CRISC, CISSP, CISM experience in planning, organizing, and developing IT security teams and strategy. Substantial exposure to data Essential: 3 - 5 years proven track record in IT Security and GRC 3 - 5 experience in governing a Microsoft