An international company, specializing in IT services is looking for a somewhat experienced Technician who can start ASAP, to join their Midrand team. Based on performance after 1 year, the contract may be made permanent. Fixing PCs and Printers. Face-to-face visits with clients (must be presentable
qualification - Completed 3-year Diploma or Degree with Computer Science as a Major. Skills / Experience: Ability problem-solving skills. Attention to detail. Internship, Development, Graduate, SDLC
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to security incidents Responsible for assessing and securing the digital infrastructure effective counter measures. : Implement and manage security technologies and controls, including firewalls detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / protection, and security information and event management (SIEM) solutions Monitor security alerts and logs identify and investigate security incidents and indicators of compromise (IOCs) Security assessments, vulnerability vulnerability scans, and penetration tests to identify security weaknesses and gaps Develop and maintain incident response plans, procedures, and playbooks Implement security best practices and ensure the integrity, confidentiality
adventure of being a Client Experience Manager in security services. Your mission? To make sure customers service and handling all the ins and outs of our Security Services Department. Your Responsibilities: Picture opportunities to grow and make a real difference in our Security Services Department. What you will receive: As
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations procedures and system logs Ensuring that the design of computer sites allows all components to fit together and of networks Continually surveying the current computer site to determine future network needs and making
/>- Design, install and manage security mechanisms that protect the company's network
Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining
Develop and implement standardised Information Security processes and procedures;
- Respond to internal
to ensure compliance and correction of all IT security issues;
- Conduct IT risk assessments;
- Research, plan, and implement information security technical solutions to meet business requirements
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal