Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against successful incumbent will require a suitable Degree/Diploma with 10 years' work experience in a technical hands-on Implement effective security controls to protect against threats. Develop Information Security policies to guide
upholding the highest standards of integrity and security.
Key Responsibilities:
We are looking for a competent Security Supervisor to undertake the surveillance of our premises and
vandalism, thefts, or other criminal behavior.
A security officer must be well-trained in surveillance and
/>Remove wrongdoers or trespassers from the area.
Secure all exits, doors, and windows after end of operations
experience as security officer or guard
Knowledge of legal guidelines for area security and public
/>Trained in self-defense.
Registered as a security officer.
If you feel you have what it takes
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Account Management infrastructure and processes. What will you be responsible for? On a day-to-day basis
PE010815-Liesl-1 The role of IT Risk Administrator resides in the Governance, Risk and Business Engagement function responsible for governance and IT Risk Management within the company. The IT Risk Administrator will be actively involved in supporting IT risk management and Third-Party Risk management activities to support the achievement Implementing & Automating Risk management processes Facilitate Risk Acceptance process – capture, process Facilitating Third Party Risk Management campaigns on platform Manage and report progress on remedial
investments and financial services industry" requires a Risk Consultant for the Western Cape branch. Minimum Assurance Implement the agreed solution for clients and manage underwriting and other onboarding requirements
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing ideal candidate will have experience in security management and knowledge of safety protocols and procedures procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities - Monitor Monitor and analyze security trends and incidents to identify areas for improvement - Coordinate with local
experience.
Performing network security tasks, including setting up and monitoring of secure voice system networks policies. Managing the access points, IP telephony, PaBX and other hardware set-ups. Managing and expanding OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working and work as a part of a team. Ability to be self-managed, ethical and honest. Ability to be respectful and
transforming the payment landscape by providing a risk-free and empowering payment solution. Their payment will be doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure operations. Conduct security assessments, including vulnerability testing and risk analyses, to maintain maintain a robust security posture. Monitor and respond proactively to security incidents and alerts, ensuring resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate