shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune Management:
4. Security and Compliance:
guests to avoid possible security risks. Notifies management and/or security of
suspicious behavior
suburb in South Africa by working with safety and security service providers, SAPS and the City of Cape Town City of Cape Town LE, security providers to the CID and other local private security providers to ensure community with security advice Critical experience • Solid previous work experience in the security industry managing operations across different types of security provision • Experience of managing multiple service safety / private security context • Existing good working relationships with SAPS / security providers / City
desirable: Previous Network segmentation, cyber security experience Previous agile and JIRA experience teams. Change Manager, network segmentation, cyber security, Agile, Jira
performance, availability, sustainability, and security compliance.
- T-SQL Scripting and development
server, database, and data issues
- Maintain security of server and database
- Maintenance and
/>- Performance tuning on SQL
- Database Security
- Have in depth SQL internal knowledge
tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy presentation Technical experience in the information security domain would be beneficial. Qualifications 3yr either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial
users
ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools
Maintains an awareness of the guests to avoid possible security problems.
- Observes players and machine
improper use or possible security problems.
- Notifies management and/or security of suspicious behavior
6 months after which it will be destroyed in a secure manner. If you object to your information being
immediately destroy your personal information in a secure manner.
If you are not contacted within 2