PTA007352-Shell-1 IT Administrator URGENTLY needed for a high end Law firm based in Pretoria. Candidate must have: IT-related issues - Monitor and maintain system security, including firewalls, anti-virus software, and implement IT policies and procedures to ensure the security and efficiency of our IT systems - Ensure compliance payslip ASAP. IT Administrator URGENTLY needed for a high end Law firm based in Pretoria. Candidate must have: IT-related issues - Monitor and maintain system security, including firewalls, anti-virus software, and
time, within scope, and budget, while maintaining high standards of quality and compliance Key Responsibilities: the latest PCI standards. Collaborate with IT, security, and compliance teams to implement necessary controls plans, including timelines, resource allocation, and risk management strategies. Monitor and track project progress, identifying and resolving issues and risks. Communicate project status, milestones, and deliverables Jira, Asana). Knowledge of IT infrastructure and security principles. Strong Agile knowledge i.e., Scrum
day administration. Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. Maintains the business-as-usual activities around software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication and operate tools for cloud storage management, high availability, cloud migration, and optimization
day administration. Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. Maintains the business-as-usual activities around administration role. Multi cloud knowledge and experience is highly advantageous. Strong knowledge of AWS (preferred) office 365 for Enterprise. Knowledge of Cloud Security and patch management processes on Cloud environment software applications for performance, integrity, and security in accordance with relevant compliance policies
day administration. Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. Maintains the business-as-usual activities around software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication and operate tools for cloud storage management, high availability, cloud migration, and optimization
their team. The client provides advanced and highly secure identification solutions and would like a professional as network security. Exceptional communication and interpersonal skills. Benefits: Highly competitive
provider committed to delivering innovative and secure solutions to our clients. This company values collaboration and manage system performance, reliability, and security.
skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written part of a development team to develop network security software. Apply via www.edrecruiters.co.za or
through the implementation and maintenance of a secure and high availability solution. Technical background
Industry is looking for an Azure Infrastructure and Security Specialist(senior) if you meet the below requirements implementation of Active Directory security concepts and IT Security Solutions in Azure · Advanced network systems like Git · Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Microsoft Defender products and Active Directory security best practices · Teamwork and strong internal and