responsible for identifying vulnerabilities and security risks in various IT systems, applications, and simulate cyber-attacks to test the effectiveness of security measures and to identify any weaknesses before Bachelor's degree in computer science, Information Security, or at least two years' experience. Relevant certifications certifications such as OSCP (Offensive Security Certified Professional), CEH (Certified Ethical Hacker) similar role in cybersecurity. Strong knowledge of security across various platforms including Linux, Windows
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
relationships with existing clients to understand their security needs, concerns, and objectives. This involves analyzing client usage patterns, anticipating security needs, and suggesting appropriate upgrades or tailored solutions that enhance their current security services. Whether it's upgrading to advanced surveillance Maintaining a comprehensive understanding of the security services offered by the company. The CLO should features, benefits, and value propositions of various security solutions to clients. Additionally, providing
infrastructure, ensuring the highest levels of performance, security, and reliability. You will lead a team of skilled design, operational excellence, and information security systems and processes. Additionally, you will to stay abreast of current trends in network, security, and cloud infrastructure, and provide strategic design, operational excellence, and information security systems and processes. Develop and implement strategies performance, security, and reliability. Stay informed about current trends in network, security, and cloud
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
and possess a solid understanding of information security best practices. Experience in legal and/or quality implementation. Information Security: Maintain and enhance the organization's information security posture. Provide Provide expertise on information security best practices and standards. Support the implementation and maintenance and provide solutions to overcome compliance and security-related issues. Act as a trusted advisor to clients effectively. Solid understanding of information security best practices. Legal and/or quality management
We are a leading company in the security industry and strive for service excellence and quality performance needed to support our mission in being the BEST security company in South Africa. MAKE SURE YOU MARK YOUR experience essential 5 years experience in the Security Industry Strong client liaison and relationship
of Linux and Unix systems to ensure top-notch security and optimal performance. Take the lead in setting promptly applying security patches and conducting daily system checks. Empower users with secure access through meticulous management of user permissions and regular security audits. Be the go-to expert for software installation Experience with server monitoring tools Knowledge of security patch management and system monitoring. Ability Ability to manage user permissions, perform security audits, and configure file sharing. Job ID: J104517 PS