of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
for designing, implementing and managing a highly secure network solution that protects against potential Firewalls, VPN, IDS/IPS, Web-Proxy, Cloud Security and Security Audits. Top candidates will be comfortable comfortable working with a variety of technologies, security problems, and troubleshooting of the network. Skills in IT infrastructures ● A deep understanding of how hackers work and ability to keep up to date with Formal Cisco certification ideal – CCNA/CCNP (Security) ● Formal Cloud certifications ideal – Azure &
Cyber Security Engineer, the main purpose of the role will be to support the Group Cyber Security Manager Manager to develop cyber security strategies, create awareness of cybersecurity, execute against strategic tactical roadmaps, and give security operational support. The Senior Cyber Security Engineer will use their cyber defence systems against a range of cyber security concerns across the company's IT, OT and Cloud experience in cyber security engineering or architecture roles 3 years' experience in securing operational technology
clients improved whole of business performance. Salary package negotiable and commensurate with skills
a dynamic team, you will be instrumental in transitioning from legacy systems such as Progress and Cobol cutting-edge solutions as a hands-on architect. Lead the transition of current systems to robust, future-oriented familiarity with AWS is a plus. Strong background in security, dev-sec ops, .NET, and C# programming. Ability waiting for you in the Netherlands. Market related salary. 8,33% holiday allowance. Dutch Government authorized
automate as much what make sense and use proper rules to ensure it is a clean and secure implementation and software Financial advice and support System security Advanced analytics to address business requirements
shared services, ensure Cyber and Information Security resilience, and act as technology governance and automate as much what make sense and use proper rules to ensure it is a clean and secure implementation manage cluster integrations support applications security - cluster & applications Qualification and installations and upgrades Business requirements Security management and data recovery Change control