Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements:
/>
Network Security Support Engineers to join a highly motivated and energetic team of security specialists specialists. The range of security technologies used by customers typically includes next generation firewalls firewalls, VPN, SDWAN, threat prevention, secure web gateways, CASB, authentication and end point protection would include: Administration and configuration of security technologies Support and troubleshooting System Min 2 years full-time experience working with security technologies – (Fortinet experience an advantage)
Proficiency in security standards and implementation
- Familiarity with Security solutions (OnPrem/Cloud)
Security
- Experience with cloud technologies (Azure
procedures
- Strong understanding of enterprise security software
Advantageous Skills
Protection, and security platform components
- Verification, planning, and actioning of security topics
security
- Operations, troubleshooting, and maintenance to improve security posture
& Plan, coordinate, and implement information security programs.
JHB001871-Chris-1 We are in search of an INFORMATION SECURITY MANAGER (ISM) to lead the technology operations be to continually develop the organization's IT security strategy to address both current and future business business demands. Successfully complete IT and Cyber Security projects within agreed-upon deadlines, scope, requirements. JOB DESCRIPTION: Job Title: Information Security Manager (ISM) Job Type: Permanent Job Industry: Johannesburg MAIN JOB PURPOSE: The Information Security Officer (ISM) is accountable for ensuring appropriate
implementation of an organisation-wide information security strategy aligned with the client's business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships. Promotes a culture of security awareness among employees through training, education address and mitigate security incidents. Ensures client's compliance with relevant security regulations, laws
experienced SOC Analyst Level 2 to join their Security Operations Center (SOC) team. The SOC Analyst role in monitoring, analyzing, and responding to security incidents to protect our clients organizational understanding of cybersecurity principles, experience with security tools and technologies, and the ability to work fast-paced environment. Monitor security alerts and events using SIEM (Security Information and Event Management) Management) tools and other security monitoring platforms. Analyze and investigate security incidents to determine
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security. Key Roles and Responsibilities: Proactively monitors information security incidents, Internet use and ICT policy breaches. Administers all security solutions solutions in the Information Security domain including, but not limited to, firewalls, IPS's, VPNs, Mail Gateways Access Control solutions, DNS clusters, Cloud security, mail and domain protection mechanisms such as
information security incidents, Internet use and ICT policy breaches. Administers all security solutions solutions in the Information Security domain including, but not limited to, firewalls, IPS's, VPNs, Mail Gateways Access Control solutions, DNS clusters, Cloud security, mail and domain protection mechanisms such as vulnerability assessments and assist with managed Security Operations Centre tasks Proactively conducts Researches, plans and implements information security technical solutions to meet business requirements