implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships.
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security.
Key Roles and Responsibilities
information security incidents, Internet use and ICT policy breaches.
Monitors, investigates and reports on information security incidents, Internet use and ICT policy breaches vulnerability assessments and assist with managed Security Operations Centre tasks. Conducts analyses and Researches, plans and implements information security technical solutions to meet business requirements requirements. Develops, reviews and maintains information security policies and procedures. Maintains awareness of years experience in Network Engineering Cisco CCNP Security certification essential CCNA certification is
systems security hardening. - Strong grasp of SAP security concepts and proficiency with SAP security tools and investigate security breaches, and test for vulnerabilities. - Maintenance of security posture for enterprise timeliness, and accuracy. - Ensure systems comply with security standards. - Manage annual penetration testing required. - Perform security remediation. - Apply and analyze impact of SAP Security Notes released. - - Provide guidance to projects on SAP Security profile parameters and analysis. - Evaluate and remediate
Operations Engineer to serve as the Feature Owner for Security Tools. The successful candidate will be responsible Protection security platform components and tools, ensuring operational stability and security. Key Responsibilities: Protection, and security platform components and tools. Verify, plan, and action security topics in collaboration Continuously improve operational stability and security, working on operations, troubleshooting, and maintenance integrate new features to enhance security posture. Ensure security-related requirements, compliance,
overall IT operations environment, considering security, operational, and business requirements. Implement overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched coordinate the deployment of patches, updates, and security fixes across all systems, applications, and infrastructure
overall IT operations environment, considering security, operational, and business requirements.
Implement
overall IT operations environment, considering security, operational, and business requirements.
experience. – (essential). - - Automation/Performance/Security scripting. – (essential). - - SQL experience. (essential). - - GUI/API automation/performance/security solutions using different tools. – (essential) non-functional / functional testing – performance testing, security testing, automation testing and usability testing
requested. Patching and deploying security configuration to secure the Red Hat environment. Qualifications:
network designs follow industry best practices and security standards. 2. Capacity Planning: Analyze network network audits to detect areas for improvement, security vulnerabilities, and compliance with best practices troubleshooting and reference. 7. Security Compliance: Implement security measures and policies to safeguard about the latest security threats and best practices to ensure the network's security posture. 8. Collaboration: