Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
& Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls knowledge of information security management and policies Sound understanding of security operational processes
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships. Promotes a culture of security awareness among employees through training, education address and mitigate security incidents. Ensures compliance with relevant security regulations, laws, and
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security. Key Roles and Responsibilities: Proactively monitors information security incidents, Internet use and ICT policy breaches. Administers all security solutions solutions in the Information Security domain including, but not limited to, firewalls, IPS's, VPNs, Mail Gateways Access Control solutions, DNS clusters, Cloud security, mail and domain protection mechanisms such as
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships.
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security.
Key Roles and Responsibilities
information security incidents, Internet use and ICT policy breaches.
systems security hardening. - Strong grasp of SAP security concepts and proficiency with SAP security tools and investigate security breaches, and test for vulnerabilities. - Maintenance of security posture for enterprise timeliness, and accuracy. - Ensure systems comply with security standards. - Manage annual penetration testing required. - Perform security remediation. - Apply and analyze impact of SAP Security Notes released. - - Provide guidance to projects on SAP Security profile parameters and analysis. - Evaluate and remediate
overall IT operations environment, considering security, operational, and business requirements. Implement overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure