a crucial role in maintaining, optimizing, and securing our cloud infrastructure. You will work closely cloud resources to implementing best practices for security and compliance, you will be instrumental in supporting services, including compute, storage, networking, and security
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
optimizing internal tools and flows, and ensuring security and processes for development and cloud infrastructure high-quality, reusable code.
and upgrades (advanced desktop, network, server, security and backup). Infrastructure and standards. Support Implement the policies and procedures regarding security and the use of the computer system and network Knowledge and expertise of networks (LAN, WAN) and security designs. Knowledge in barcode technology / scanning
maintain all current audits. Online ordering system management. 3. Eskort Online Data/Document management
website performance and load times ● Implementing security measures to protect websites from cyber threats Problem-solving and debugging abilities ● Knowledge of web security best practices ● Excellent communication and teamwork
optimizing internal tools and flows, and ensuring security and processes for development and cloud infrastructure maintains high-quality, reusable code. Ensures system security and data safety. Creates pipelines to optimize Engineers' data structures. Ensures compliance to data security standards. Performs maintenance to ensure data
Implement technical lifecycle management measures and security measures. Drive measures to improve operational for scalable, distributed systems. Security of AWS services, securing design of VPC architectures. Experience
network in Pretoria, including updates, patching, security and backups. He/she will act as a section's purchasing Information Resource Management (IRM) and Diplomatic Security (DS). This includes the following; Performs hardware Responsible for the smooth operations and overall security and functionality of the various Databases, including applications. Installs all upgrades, patches and fixes to secure data. Makes configuration changes to affected servers the following: Ensure the DoS configuration and security standards for SharePoint sites are followed. Ensure