Experienced in managing security on a mine § Comprehensive understanding of security function gained through education and completed with practical experience as security official or member of SAPS § Experience in conducting literate, valid driver's license § Ensure that all security risks have been identified, treated and mitigated leading practices § Conduct ongoing assessments of security procedures and practices to enable effective mitigation effective deployment, management and utilization of security systems and technology to minimize risk § Develop
process of Vulnerability and Patch Management security solutions and provide enhancements for the client client. Administration of Vulnerability Management Security Solutions and researching, designing & developing vulnerability management solution. Maintain information security technology management based on the industry good applicable laws and regulations Ensure an ongoing security technology improvement program across the client client through the appropriate mechanisms such as security compliance audits, risk / vulnerability assessment
Certifications Security Minimum 5 years maintenance and support experience in endpoint security, supporting Version 3 Process Knowledge and experience E-mail security knowledge or experience Key Performance Areas: Provide technical support, including reporting and security application software management and administration define policies/rules as they relate to e-mail security and other anti-virus, anti-malware, AV/EDR and endpoint technologies will also be required. Keep security systems configuration documentation up to date
equivalent
What you will be doing: Develop and maintain security architecture aligned with business goals and regulatory regulatory requirements. Conduct regular security reviews, risk assessments, and implement strategic strategic plans. Prioritise and adjust security initiatives based on risks, business needs, and evolving threats interventions, and enhance security policies, procedures, and technologies. Deploy security solutions and tools primary technical resource. Provide expert advice on security issues, managing incident response and prevention
Reference: Pta002867-EP-8 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Company requires a SAP Security Specialist to be responsible for providing security support within the SAP and allocate SAP Security JIRA requests. Handle incident management and resolve security issues per SOP's solutions for complex SAP Security issues via SAP OSS. Assist with security requirements during SAP system projects within SAP Security. Serve as the SAP Security SME for the end-to-end security lifecycle. Matric complex security issues in S4 HANA, Fiori, Business Objects, and Solution Manager ChaRM. S/4H security/authorisations
rience with security standards and their implementation
services of a Security Manager to join their team ROLES AND RESPONSIBILITIES Ensure that all security risks have leading practices Conduct ongoing assessments of security procedures and practices to enable effective mitigation effective deployment, management and utilization of security systems and technology to minimize risk Develop §Investigate all on-site crime related incidents Ensure security of product on trucks leaving the mine Provide relevant security related legislation/policies/procedures Experienced in managing security on a mine
Datacentrix Cape Town is looking for a Network Security Engineer Requirements: Matric or Grade 12 Essential equivalent FortiGate NSE4 or equivalent Cyber Security Certification Awareness to strict IT Policies