based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly established change management processes Perform risk assessments and impact analysis for proposed network traffic for security threats and vulnerabilities, and take proactive measures to mitigate risks Work closely
behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant Certification in risk, information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions Third-party Risk management. Conducting Risk assessment and Cloud assurance. Experience in security management
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology performance tune production databases while ensuring high levels of data availability. This individual is business user needs. Perform database transaction and security audits. Establish appropriate end-user database stats, backups Responsible to identify and manage risks within your environment. Qualifications Matric Degree issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology performance tune production databases while ensuring high levels of data availability. This individual is needs.
Qu
issues, log shipping issues, connectivity issues, security issues etc.
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable or embedding analytics into workflows that reduce risk or power your growth. Clients choose EXL as their at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
transformation to mitigate and manage the associated risks in regard to IT assets and services. Ensure that reliable, secure, efficient, and scalable. Coordinate with other IT teams and vendors to deliver high-quality Recognised M365 certifications: Microsoft 365 Security Administrator Associate, Identity and Access Administrator
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology Management platforms to ensure stability and continued high performance of said platforms and applications deployed and use proper rules to ensure it is a clean and secure implementation. What will make you successful in and software Financial advice and support System security Advanced analytics to address business requirements
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology Management platforms to ensure stability and continued high performance of said platforms and applications deployed and use proper rules to ensure it is a clean and secure implementation.
What will make you
software
performance tune production databases while ensuring high levels of data availability. This individual is needs.