services of a Security Manager to join their team ROLES AND RESPONSIBILITIES Ensure that all security risks have leading practices Conduct ongoing assessments of security procedures and practices to enable effective mitigation effective deployment, management and utilization of security systems and technology to minimize risk Develop §Investigate all on-site crime related incidents Ensure security of product on trucks leaving the mine Provide relevant security related legislation/policies/procedures Experienced in managing security on a mine
skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written part of a development team to develop network security software. Apply via www.edrecruiters.co.za or
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
to join our team in the Computer & Network Security industry. As a Mid Tier Consultant, you will play
guidance and support to our clients in optimizing and securing their mid-tier application layers. This is a challenging
understand their mid-tier application requirements and security objectives
Design, develop, and implement
solutions that meet clients'' security needs
Perform security assessments, vulnerability scans
mid-tier applications
Identify and recommend security enhancements and best practices for mid-tier application
developing and executing ICT Infrastructure and Security roadmaps aligned with the Client's goals and objectives envisioning the future state of infrastructure and Security requirements within the Organization, identifying initiatives. Manage and implement ICT infrastructure and security, including network systems, servers, storage, cybersecurity. Oversee ICT infrastructure and security projects, ensuring adherence to timelines, budgets Develop and execute strategic ICT Infrastructure and Security roadmaps aligned with Client goals, contributing
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
impact of underlying contracts on facilities and securities in consultation with the underwriter. Legal advice advice to businesses on applicable securities to protect the business. Negotiating guarantee terms with processing of guarantee applications (wordings & security signoffs). Facilitate all cancellations and reductions clients on related queries. Securities: Advise underwriters on appropriate security and collateral for facilities once-off client/project specific security documents. Negotiate terms of security documents as and when required
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
Description Branch Manager required for a security company based in Mthatha Responsibilities include Oversee all aspects of branch operations, including security personnel deployment, client relations, and administrative market expansion. Lead and motivate a team of security professionals, providing guidance, training, and upselling additional services to meet their evolving security needs. Collaborate with corporate management and administration, security management, or a related field preferred. Proven experience in security management