br />
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
Representative within the Security industry.
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
implementation of Active Directory security concepts and IT Security Solutions in Azure
· Advanced
systems like Git
· Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft
Microsoft Defender products and Active Directory security best practices
· Teamwork and strong internal
Reference: Pta002867-EP-8 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
project development and management of just energy transition projects. This position involves working on a support for projects related to the just energy transition. Project Planning and Management Conceptual Design
position.