Direct the organisation's security functions, including physical security and safety of employees, facilities Qualifications/Requirements: 8 Years' Protection Services / Security operations experience 2 Years' Management Experience Diploma: Security Management Bachelor of Technology: Security Management or equivalent Mining, Security, Manager
your career. General Role Description The Cyber Security Analyst is responsible for monitoring, detecting Responsibilities: Monitor and analyze security alerts from various security tools and information sources to incidents. Investigate suspicious activities, security breaches, and cyber attacks to determine their to identify security gaps and propose remediation strategies. Develop and implement security standards countermeasures to mitigate risks and enhance the overall security posture. Collaborate with cross-functional teams
services of a Security Manager to join their team ROLES AND RESPONSIBILITIES Ensure that all security risks have leading practices Conduct ongoing assessments of security procedures and practices to enable effective mitigation effective deployment, management and utilization of security systems and technology to minimize risk Develop §Investigate all on-site crime related incidents Ensure security of product on trucks leaving the mine Provide relevant security related legislation/policies/procedures Experienced in managing security on a mine
highly skilled and experienced Engineering Lead: Security to join our client on a 12-month renewable contract Collaborate with cross-functional teams to identify security needs and develop solutions Develop and implement to improve the overall security posture of the company Conduct regular security assessments and audits remediation plans Stay up-to-date with the latest security trends, technologies, and best practices Manage industry standards and regulations related to security Qualifications: Bachelor's degree in Computer
skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written part of a development team to develop network security software. Apply via www.edrecruiters.co.za or
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
rience with security standards and their implementation
hardware analysis and the contribution to the security of their systems. Your background in system administration hardware components to ensure their integrity and security. • System Administration: Utilize your MS Server server systems, ensuring optimal performance and security. • Cloud Infrastructure Management: Assist in reliability, and security. • Network Security: Implement and maintain network security measures, including senior analysts and other team members to identify security vulnerabilities and develop strategies for mitigation
stakeholders.