of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
IT Compliance and Security Specialist (JB4361) Sandton, Gauteng R40 000 to R45 000 a month CTC Permanent industries is currently looking for a IT Compliance and Security Specialist to join their Team. Their products IT Risk Assessments, networks, servers, cyber security, and general end user support. Candidate must must have knowledge of I.T. Operations, security, governance, frameworks, and a firm grasp of the below to possess firm knowledge of Microsoft Baseline Network Security v1.5, Microsoft patch management, user administration
Xcede We have a current opportunity for a DDOS Security Engineer on a permanent basis. The position will
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Dockyard, based in Simons Town, has a vacancy for a Security Officer. Applications are invited from people below. PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of GRADE: B4 PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of recorded in Key Register. Perform tasks unrelated to Security and assist other sections as instructed by Management to work overtime/shifts Must have own transport Security related knowledge Effective Communication (verbal
policies and procedures Sound knowledge of CCTV and security systems Background and skills in investigations
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including