Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
/>Troubleshoot security and network problems.
Respond to all system and/or network security breaches.
Plan, implement, monitor, and upgrade security measures for the protection of the organizations
/>Provide recommendations and guidance on identified security and control risks.
Develop a strong understanding
services and solutions to their clients, helping to secure and enhance their IT reputations. The successful system to be maintained Essential Requirements • Grade 12 • A and N or similar IT related qualification
provide a mitigating methodology to ensure data security. Your key responsibilities will include, but is recommendations for enhancing IT controls and security measures, aligning with organizational goals and stakeholders. Data Security Assessment and Enhancement: Assess the effectiveness of data security measures comprehensively classification. Provide achievable recommendations to secure data security strength and mitigate potential vulnerabilities process. Minimum 3 years managing a team. Cyber security experience Financial Services experience Kindly
applications meet performance, availability, and security requirements Support and maintain existing RFID Queue (MQ) systems (MQTT). Understanding of IT security: authentication and authorization (JWT), encryption hardware/software vulnerabilities, and network security. Understanding of DevOps processes. Proficient
be advantageous. Sound knowledge of Information Security controls, concepts, and best practices is required solid understanding of technology and associated security risks. R800K P/A
emphasis on Azure cloud services.
bottlenecks for efficient data retrieval. Implement security measures to protect sensitive BI data. Define Implement security measures in PHP applications to prevent vulnerabilities. Address common security issues
requirements for data quality, data lineage, data security, data privacy and other relevant aspects for business management improvements, set data quality, data security, data privacy, data issue remediation guidelines experience with data quality, data lineage, data security, data privacy, data lifecycle management, data
specialized in database access monitoring and security auditing, your primary responsibility will be on-premises and in the cloud solutions to ensure the security and integrity of the PostgreSQL databases. You