similar role, with a proven track record in cloud security
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR OR ARMED RESPONSE OFFICER EXPERIENCE AND DONT HAVE THE RELEVANT PAPERWORK, YOUR CV WILL BE REJECTED IMMEDIATELY reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions
Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
Introduction Position Overview: As a Security Director, you will play a critical role in safeguarding lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your and Implementation: Develop, review, and update security policies, protocols, and guidelines. Ensure consistent emerging threats. Personnel Management: Supervise security staff, including hiring, training, and performance teamwork. Allocate resources effectively to meet security needs. Risk Assessment and Mitigation: Conduct
is currently looking for a Cyber Safety & Security Engineer within the Digital Technology Department to identify security control and/or capability gaps that impacts the organization's security posture Provide reviews and actively lead the discussions from a security standpoint Create formal written documentation patches for discovered vulnerabilities; assist security, server management, desktop, private/public cloud when necessary. Expand the use of automation in securing the environment and across multiple technology
focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures trong>
community – is seeking to urgently place a Network Security and Support Engineer to protect highly confidential focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures threats Duties: Design, configure, and implement secure network solutions, including firewalls, intrusion software and WiFi issues Develop and enforce network security policies, procedures, and best practices installing g. ISO27001, GDPR) and their impact on network security Solid understanding of network protocols, routing
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR OR ARMED RESPONSE OFFICER EXPERIENCE AND DONT HAVE THE RELEVANT PAPERWORK, YOUR CV WILL BE REJECTED IMMEDIATELY reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials