to all institutes. Ensure that all systems are secured and protected to all threats i.e. effective deployment monitoring of Antivirus in the ICT environment. Review security and backup procedures and processes for improvement endpoint security, management i.e. AV and patch deployment. Ensure diagnosis and resolution of security incidents and functionality. Operational Write reports on security incidents. Participate in change control implementation qualification in an IT field. Formal Microsoft Security Certifications; MCSE. Min 5 years Systems Engineering
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
Server, A Basic knowledge of security best practices and network security technologies Proficiency in communication Troubleshooting and problem-solving Security and Best Practices R220 000 - R250 000 Per annum
continuous integration. Security Savvy: Implement SSL encryption and other web service security measures. Back-End expertise. Knowledge of SSL encryption and web service security. Exposure to enterprise-wide service integration
supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery & development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery &
development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery & development including IFM Services etc., Physical Security such as - Guards, Electronic access, CCTV etc functionally responsible for EHS, Information Security, Business Continuity, Disaster Recovery &
IT-related issues - Monitor and maintain system security, including firewalls, anti-virus software, and implement IT policies and procedures to ensure the security and efficiency of our IT systems - Ensure compliance IT-related issues - Monitor and maintain system security, including firewalls, anti-virus software, and implement IT policies and procedures to ensure the security and efficiency of our IT systems - Ensure compliance
responsible for the performance, integrity and security of databases. Responsibilities: Establishing the needs of users and monitoring user access and security Monitoring performance and managing parameters operational staff to ensure database integrity and security Commissioning and installing new applications Logins as well as have strong knowledge in Database Security SSIS, SSRS and Analysis Services experience would
ensuring high availability, reliability, and security of critical systems and services housed within costs, and enhance performance. Security and Compliance: Ensure the security of the data center infrastructure unauthorized access, data breaches, and other security threats. Maintain compliance with relevant regulations data protection and privacy laws. Conduct regular security audits and assessments to identify and mitigate power/cooling systems. Strong understanding of data center security, high availability, and disaster recovery principles