br />
are seeking a Security Analyst to join our team. As a Security Analyst, you will play consoles
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
Manager
- CCNP (Networking or Security) and CISSP a must.
- Cloud Security and Network an advantage.
- Endpoint Security an advantage (Panda, Mcafee, Symantec etc.)
Experience
SECURITY SOFTWARE DEVELOPER
Pretoria East
Minimum Req
communications security and cryptography.
Should you not receive a response within 14 days, please consider your application as unsuccessful.
Should you not receive a response within 14 days, please consider your application as unsuccessful.
Reference: Pta002867-EP-8 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis