Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
policies and procedures Sound knowledge of CCTV and security systems Background and skills in investigations
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
Introduction Position Overview: As a Security Director, you will play a critical role in safeguarding lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your and Implementation: Develop, review, and update security policies, protocols, and guidelines. Ensure consistent emerging threats. Personnel Management: Supervise security staff, including hiring, training, and performance teamwork. Allocate resources effectively to meet security needs. Risk Assessment and Mitigation: Conduct
on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This is at the heart of our security operations, offering the chance to shape security architecture, deploy with clear data driven results for use during security assessments, incident analysis and root cause Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes. Monitor networks and connected devices for security issues. Proactively respond to and report on DLP
Job Title: Information Security Manager (ISM)
Job Type:
PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR OR ARMED RESPONSE OFFICER EXPERIENCE AND DONT HAVE THE RELEVANT PAPERWORK, YOUR CV WILL BE REJECTED IMMEDIATELY reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management strategic, comprehensive enterprise information security and IT risk management program to ensure that Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced