on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This is at the heart of our security operations, offering the chance to shape security architecture, deploy for use during security assessments, incident analysis and root cause investigations Lead remediation Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes. Monitor networks and connected devices for security issues. Proactively respond to and report on DLP
risk-related queries within the business, encompassing investigation, mitigation, and reporting. An analytical mindset and highlight suspected fraudulent activity. Investigate suspected fraud cases with forensic methodology provide assistance / feedback to customers. Load security blocks where suspicious transactions / activity transactions / activity with customers to detect / prevent fraud (all fraud types) Ensure that procedures feedback to internal and external stakeholders. Investigate / resolve customer disputes / cases. Escalate
risk-related queries within the business, encompassing investigation, mitigation, and reporting. An analytical mindset and highlight suspected fraudulent activity. Investigate suspected fraud cases with forensic methodology provide assistance / feedback to customers. Load security blocks where suspicious transactions / activity transactions / activity with customers to detect / prevent fraud (all fraud types) Ensure that procedures feedback to internal and external stakeholders. Investigate / resolve customer disputes / cases. Escalate
oversee IT projects, and ensure the reliability and security of IT systems. The Senior IT Technician will also performance, reliability, and security, implementing proactive measures to prevent downtime and data breaches Conduct regular security audits and assessments to identify vulnerabilities and implement security measures to end-users on IT systems, applications, and security best practices. Bachelor's degree in Computer
to best practices Security and Access Management: Enforcing and managing security protocols, including roles and permissions to ensure compliance wiht security standards Optimization and Performance Tuning: communication skills Eagerness and willingness to investigate and challenge information and actions when necessary
processes while communicating any potential risks and losses. All of this will be done while working closely Managing cash efficiencies · Coordinating and preventing cash outs · Providing feedback and regular updates
processes while communicating any potential risks and losses. All of this will be done while working closely Managing cash efficiencies · Coordinating and preventing cash outs · Providing feedback and regular updates
with resolution tasks performed Identifies, investigates, analyses issues and errors prior to or when impact a client's service Provides Assistance to L1 Security Engineers for better initial triage or troubleshooting Switches, Cloud Infrastructure Cloud Networking Cloud Security Cloud Services Management Computing Database Tuning Networking Solutions Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Performance Optimizations certification CCNA certification in must, CCNP in Security or PCNSE certification is good to have Microsoft
understanding HIV Vaccines and Pathogenesis, Prevention and Epidemiology, the links between Tuberculosis recognised as a DSI-NRF Centre of Excellence in HIV Prevention and hosts the SAMRC HIV-TB Pathogenesis and Treatment analysis of service interruptions and establish preventive measures Manage ICT assets and stock Monthly
CPT002478-AK-1 Our global client who produce cutting edge security products is seeking a Firmware Engineer to join in an embedded Linux environment, implementing secure and performant applications. Responsibilities: successful delivery of products. Participate in security reviews with the team helping to identify problem GNU toolchains, gdb and cmake Experience with Secure Software Development Lifecycles Experience Cryptographic utilizing virtual machines Familiarity with cyber security related tools and testing methodologies Familiarity