Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
troubleshooting system-related issues and ensuring system security and availability. You will need Certifications design, implementation, and maintenance; system security concepts and protocols and cloud computing. DUTIES: customers. Maintain system security by monitoring system activity, implementing security policies and procedures procedures, and identifying and mitigating security threats. Ensure compliance with industry and organizational Experience with cloud computing. Knowledge of system security concepts and protocols. Advantageous – Bachelor's
storage, and Telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure operational resilience. IT Security and Compliance – Develop and enforce IT security policies, procedures, mitigate Cybersecurity risks. Conduct regular security assessments and audits to identify vulnerabilities Cybersecurity best practices and ensure a culture of security awareness. Strategic Planning and Leadership –
Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS).& 3 years' work experience Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS). AWS Associate level Certifications Experience in Kubernetes architecture, Networking, Security, Deployment, and Management. Infrastructure as technologies experience like SOAP and REST. Web Security protocols experience like OAuth, JWT, OIDC. Capable
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience ESXi Disaster Recovery/Risk Management Firewall / Security Experience Knowledge of Contact Centre Technologies
as plugin conflicts, performance problems, or security vulnerabilities. Conduct thorough testing and and tools. Experience with website security and implementing security measures. Familiarity with UX/UI
who possess general knowledge of Southern and/or East Africa. You will create itineraries in WETU for
who possess general knowledge of Southern and/or East Africa. You will create itineraries in WETU for
negotiate with vendors, outsourcers, and contractors to secure system-related products and services. Perform routine managing customer expectations. Perform server and security audits, system backup procedures, and other recovery guidelines. Document, and enforce the standards, security procedures, and controls for access to ensure administration including the monitoring of systems, security, performance, and backup/restore and configuration
EIGRP, OSPF and BGP. Ensure maximum up-time. IT Security Management – Develop emergency, recovery, and drive encryption. Ensure server room security. Compile yearly security report. Provide Pre- and Post-Sale