Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls
Reference: PE010794-Podu-1 Cyber Security Specialist Key Roles and Responsibilities: Determine who requires & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them. Good working knowledge of various security technologies such as network and application firewalls
PE010796-Tabz-1 Our client is looking for a Cyber Security Specialist for a 12 month contract based in the & Plan, coordinate, and implement information security programs. Determine who requires access to which & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various
Degree (IT/Computer Science or similar) coupled with 4 -8 years of experience in the field of Software Development software, network performance & troubleshooting, security, and backups Database Management - SQL Configuration
JSE Listed Group (based in Isando). 6 month contract (possible renewable). Hybrid (3 to 4 times per week requirements for data quality, data lineage, data security, data privacy and other relevant aspects for business management improvements, set data quality, data security, data privacy, data issue remediation guidelines experience with data quality, data lineage, data security, data privacy, data lifecycle management, data
Optimally define database parameters. Define data security rules (physical and logical) as well as standards user access permissions and data security issues with the security engineer. Manage version migrations user acceptance test. Must be the custodian of the group norms and policies respect: Use only Business applications/MIS compliant with company IT catalogue. Apply Group security and licensing policies. Manage IT Infrastructure or equivalence - Advantage ISO 27000, other IT security Training IIS Remote Desktop Services WSUS PowerShell
Optimally define database parameters. Define data security rules (physical and logical) as well as standards user access permissions and data security issues with the security engineer. Manage version migrations user acceptance test. Must be the custodian of the group norms and policies respect: Use only Business applications/MIS compliant with company IT catalogue. Apply Group security and licensing policies. Manage IT Infrastructure or equivalence - Advantage ISO 27000, other IT security Training IIS Remote Desktop Services WSUS PowerShell
keeping all systems up to date with patches and security fixes, and helping end-users do their job more long-term fault, configuration, performance and security management of Desktops systems Install, configure Server Administration - Active Directory, Data Security, Group Policies etc. - Installation and troubleshooting
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships. Promotes a culture of security awareness among employees through training, education address and mitigate security incidents. Ensures compliance with relevant security regulations, laws, and