overall IT operations environment, considering security, operational, and business requirements. Implement overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
experience (SAP, BI, Microsoft etc.) Must have a valid driver's license and own car. Must have a valid Covid Vaccination mediro-ict .co .za The Data Governance Lead is responsible for ensuring the effective working of the data data related policies, standards, roles and responsibilities defined by regulator (POPIA, GDPR). Implement requirements for data quality, data lineage, data security, data privacy and other relevant aspects for business management improvements, set data quality, data security, data privacy, data issue remediation guidelines
different sites requires owning a vehicle and a valid driver's license. Duties: 5 Years of the following: Deliver Microsoft products, Server and Storage hardware, Security, and on-site computer rooms. Manage risks related areas for improvement. Security Planning: Developing and implementing security measures to protect servers unauthorized access, data breaches, and other security threats. Disaster Recovery Planning: Creating
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
to join their team. Be part of a global team responsible for the development and operation of the client's external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders new features and components. Main function: Be responsible for the operations and standardization of the infrastructure, platform and desktop components. Be responsible for the verification, planning and actioning developing rest APIs using C# and .Net. Deploying secure Azure Application services, private endpoints etc
Manual, Performance, security, and load testing. Any additional responsibilities assigned in the Agile Identification, Creation & Sanitation of Test Data Security and Reliability Testing. Technical Test Case creation
Manual, Performance, security, and load testing. Any additional responsibilities assigned in the Agile Identification, Creation & Sanitation of Test Data Security and Reliability Testing. Technical Test Case creation
exposure within the networking, voice and perimeter security infrastructure. Provide specialised support for environments. Certifications Desirable: CompTIA Security Cisco Certified Entry Networking Technician (CCENT) (CCNA) Cisco Certified Network Associate – Security (CCNA-Security) An undergraduate qualification (bachelor's LOW Proficiency in networking protocols, network security and information management systems is essential
Govendermediro-ict.co.za WHAT WILL BE YOUR ROLE AND RESPONSIBILITIES? Design and implement a robust test automation Integration, performance and load testing and security testing using industry standard tools, fit for integration. Test data management. Performance, security and load testing. Evaluate test scenarios Execute REST-Assured, Soap-UI, Postman GitHub Advanced Security, Burp Suite, Contrast Assess, Grafana k6, Karate Infrastructure: AZURE cloud Any additional responsibilities assigned in the Agile Working Model (AWM)
(VDI deployment / Public - and Private Cloud). Responsible for VDI Deployment. Understanding CA Data Management meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies