ion in network or security-related fields (e.g., CCNA, CompTIA Network+, Security+, etc.)
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial presentation Technical experience in the information security domain would be beneficial. Knowledge and Skills
shared services, ensure Cyber and Information Security resilience, and act as technology governance and users
Knowledge
ensuring their reliability, performance, and security. Your expertise in MsSQL, SSIS, SSRS, SSAS, and ensuring high availability, performance, and security. Monitor database performance and proactively system performance. Implement and manage database security measures to protect sensitive data. Stay up to recovery strategies. Familiarity with database security and access controls. Excellent problem-solving
tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial presentation Technical experience in the information security domain would be beneficial. Knowledge and Skills: tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial
Xcede We have a current opportunity for a Security Compliance Analyst on a permanent basis. The position
Python, business networks, cloud services, network security and virtualisation. Network Systems Administrator business networks, cloud services (AWS), Network security and virtualisation (Docker, VSphere, VirtualBox)
users
production systems. Ensuring availability, performance, security and scalability of AWS production systems. Managing of critical system security by leveraging best practices and prolific cloud security solutions. Providing architecture and process improvements. Implementation of security protocols by evaluating business strategies and
delivery. Adhere to best practices when it comes to security (secret keys / tokens), Design, Build, and Maintain System Performance, Security, and Scalability: Enhance system performance, security, and scalability through frameworks. REST APIs that meets performance and security standards.