highly skilled and experienced Engineering Lead: Security to join our client on a 12-month renewable contract Collaborate with cross-functional teams to identify security needs and develop solutions Develop and implement to improve the overall security posture of the company Conduct regular security assessments and audits remediation plans Stay up-to-date with the latest security trends, technologies, and best practices Manage related to security Qualifications: Bachelor's degree in Computer Science, BCom (Information Systems) TOGAF
Hospital Management Reporting structure: HR Systems Information Manager Role summary: The candidate will be responsible business requirement, user documentation and user securities settings are up to date. Management of organisational manuals. System security: Maintain user access to the system as per the system security matrix and SOP 12. Preferred- 3 year Tertiary Education in Information Technology or equivalent experience high advantageous interest in remuneration and Human Resources Information System. 1-2 years SQL server 2019 experience
Management Performance Tuning and Optimization Data Security and Backup Data Integration and Migration Database Development Bachelor's degree in Computer Science, or Information Systems, or Business Management, or equivalent
across the organisation Ensure adherence to data security and privacy regulations Share data architecture initiatives Bachelor's degree in Computer Science, Information Systems, or Business Management, or equivalent Understanding of data governance, quality, and security regulations Strong understanding and experience
and disaster recovery plans, and ensuring system security and compliance with industry standards. Role & and Linux servers, ensuring optimal performance, security, and availability; Implement and manage virtualisation resolving issues promptly; Implement and enforce security policies, including firewalls, antivirus software detection/prevention systems; Conduct regular security audits and vulnerability assessments, addressing Generate and analyse reports on system performance, security incidents, and other relevant metrics; Develop
operation and user satisfaction Secure Coding and Compliance: Adhere to secure coding practices and comply including PCI DSS, GDPR, and POPIA, to ensure software security and data protection Agile Development: Participate Computer Science and IT, (BCom) in Information Technology, (BEng) in Information Technology or Software Engineering
Description Job Family Information Technology Career Stream IT Architecture Leadership Pipeline Manage agreements Reduce risk by ensuring accuracy of information through compliance with risk and compliance requirements Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices
ensuring their performance, availability, and security. The role requires a blend of technical expertise in maintaining the integrity, performance, and security of the company's databases. They are expected and efficiency. Data Security and Backup: Implement and maintain database security measures to protect Education: Bachelor's degree in Computer Science, Information Technology, or a related field. Experience: 3-5
designing and implementing scalable, reliable, and secure architectures. You will work closely with cross-functional Design: Design and implement scalable, reliable, and secure solutions using Azure, AWS, IoT, and microservices technical specifications. Security: Ensure that solutions adhere to security best practices and regulatory Bachelor's or master's degree in computer science, Information Technology, or a related field. Certifications:
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process in cloud security best practices, including identity and access management, network security, and encryption;