constantly scanning, watching… You must be in Cyber Security. Our client, a major player in the renewable energy generation capacity, is looking for a Senior Cyber Security Engineer to join their team. Crucial to accepting firewalls Forigate Juniper Aruba Microsoft Azure security M365 Defender Sentinel SIEM Intune This role is is akin to working for a national security team. We are looking for the best of the best to safeguard Design, manage, configure, and maintain security for Azure Security and M365 Follow change control processes
Administrative Coordinator (Security) to perform all administrative duties required by our Security Team. With the the Security Manager, the incumbent will coordinate office operations, projects, and provide administrative Coordinator (Security) will have good communication skills in order to share information with the Security Team Administrative Coordinator (Security) will provide day-to-day assistance to the Security Team. The Administrative Administrative Coordinator (Security) will report to the Security Manager. Supports the team with all administrative
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations operations in the Western Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities vulnerabilities - Monitor and analyze security trends and incidents to identify areas for improvement
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations operations in the Western Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities vulnerabilities - Monitor and analyze security trends and incidents to identify areas for improvement
Certified Network Professional (CCNP) Security Engineer looking for an exciting opportunity motivated individual to join our team. As a CCNP Security Engineer, you'll play a crucial role in designing designing, implementing, and managing secure network infrastructures for our clients.
What
Network Security.
behalf of our client is recruiting for a Cyber Security Consultant. Contract role until December 2025 systems and/or security desired Work Experience: Minimum 3- 5 years of experience in IT security, Identity Access Management (IAM), DLP experience, Cloud Security and Governance. Knowledge and skills: Knowledge Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions and Cloud assurance. Experience in security management, security and network architecture and/or design
-
- Automation/Performance/Security scripting. (essential).
-
-
- GUI/API automation/performance/security solutions using different tools. (essential)
non-functional / functional testing performance testing, security testing, automation testing and usability testing
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration:
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration: