highly skilled Senior Cyber Security Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting assisting with the development and management of the 3-to-5-year Cyber Security Strategy Achieving and maintaining
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
Position: Cyber Security Engineer Hire Resolves client is seeking a highly skilled and experienced Cyber Cyber Security Engineer to join their team in Middelburg, Mpumalanga. The successful candidate will be responsible for monitoring, assessing, and implementing security measures to protect their organisation's systems maintain security measures to protect computer systems, networks, and data Conduct regular security audits monitor security systems, and investigate security breaches Develop and implement security policies
DevOps 9. Automation Testing 10. IT Project Management 11. Finance, Risk & Compliance 12. Engineering Specialist, you will be responsible for leading complex security assessments and penetration testing projects to Practice effective communication skills. FINANCIAL Manage time in line with the allocated budget and communicate stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Conduct accordance with approved Internal Audit methodology. Manage client interaction for allocated areas of scope
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the resilience risk management framework that includes monitoring of cyber risk, cyber security program, policies cluster-specific cyber security program elements, and regulatory matters as it relates to cyber security.
Requirements:
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Account Management infrastructure and processes. What will you be responsible for? On a day-to-day basis
focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures trong>
use ISO 9000; researches and manufactures pest management products on large scale for the farming community community – is seeking to urgently place a Network Security and Support Engineer to protect highly confidential focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures threats Duties: Design, configure, and implement secure network solutions, including firewalls, intrusion software and WiFi issues Develop and enforce network security policies, procedures, and best practices installing