services of a Security Manager to join their team ROLES AND RESPONSIBILITIES Ensure that all security risks have leading practices Conduct ongoing assessments of security procedures and practices to enable effective mitigation effective deployment, management and utilization of security systems and technology to minimize risk Develop §Investigate all on-site crime related incidents Ensure security of product on trucks leaving the mine Provide relevant security related legislation/policies/procedures Experienced in managing security on a mine
highly skilled and experienced Engineering Lead: Security to join our client on a 12-month renewable contract Collaborate with cross-functional teams to identify security needs and develop solutions Develop and implement to improve the overall security posture of the company Conduct regular security assessments and audits remediation plans Stay up-to-date with the latest security trends, technologies, and best practices Manage industry standards and regulations related to security Qualifications: Bachelor's degree in Computer
skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written part of a development team to develop network security software. Apply via www.edrecruiters.co.za or
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
Branch Manager required for a security company based in Mthatha
security personnel deployment, client relations, and administrative expansion.Description Branch Manager required for a security company based in Mthatha Responsibilities include Oversee all aspects of branch operations, including security personnel deployment, client relations, and administrative market expansion. Lead and motivate a team of security professionals, providing guidance, training, and upselling additional services to meet their evolving security needs. Collaborate with corporate management and administration, security management, or a related field preferred. Proven experience in security management
Description Branch Manager required for a security company based in Mthatha Responsibilities include Oversee all aspects of branch operations, including security personnel deployment, client relations, and administrative market expansion. Lead and motivate a team of security professionals, providing guidance, training, and upselling additional services to meet their evolving security needs. Collaborate with corporate management and administration, security management, or a related field preferred. Proven experience in security management
experience as a DevSecOps Engineer or in the Cyber Security sector
Like Optimus Prime working in harmony
processes, constructing a powerful and resilient security infrastructure
As a member of the Autobot
role in defining, implementing, and maintaining security strategies, always staying one step ahead of emerging
you embody a profound understanding of Microsoft Security features, enabling you to identify vulnerabilities
Good understanding of networking and network security is a must; knowledge of cryptographic principles >Good understanding of networking and network security
South African citizenship (for security clearance purposes
payments, procurement, service management, data security related processes and IT support services. 1. includes user account management, access control, and security configuration. 3. Network Operations: Managing optimization, and security compliance. 4. Security Operations: Implementing and maintaining security measures intrusion detection systems, and conducting regular security audits and assessments. 5. Incident Response: