& Plan, coordinate, and implement information security programs. Help protect against Web threats that incident and change processes, Perform Problem management analyses and duties, during the week and on weekends (guides, configuration documents, etc.) CMDB management, Tracking of IT software as relating to Cyber hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that incident and change processes, Perform Problem management analyses and duties, during the week and on weekends (guides, configuration documents, etc.) CMDB management, Tracking of IT software as relating to Cyber hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Join Our Team at Gridhawk Security!
Gridhawk Security is seeking a dedicated Sales response contracts. If you're passionate about security sales, excel at building relationships, and thrive />As a Sales Representative at Gridhawk Security, you'll be instrumental in selling armed response will directly contribute to our success in the security industry.
Key Responsibilities: and address queries.
Relationship Management:
Maintain strong client relationships
& Plan, coordinate, and implement information security programs.
Dockyard, based in Simons Town, has a vacancy for a Security Officer. Applications are invited from people below. PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of GRADE: B4 PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of tasks unrelated to Security and assist other sections as instructed by Management. The completion of to work overtime/shifts Must have own transport Security related knowledge Effective Communication (verbal
CCTV and security systems Background and skills in investigations 3 years of experience in manage of staff
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they