and Cyber Security and technical expertise is sought to fill the role of a Senior Security & Systems monitoring, and support of internal and client facing Security & Systems, both on-premises and in the Azure 365 Certified and have Certifications such as Security, CEH, CISA, CISSP and OSCP. You will require 8-10 Cybersecurity. Develop and implement information security related processes/systems/services through project reporting. Contribute and participate in Information Security awareness drives and campaigns. REQUIREMENTS:
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
requirement to strengthen the security posture and align more closely with the Security teams. This role involves various IT Infrastructure and security teams to ensure that business data is secured according to current policies to Implement procedures that support the Data Security function. Conceptualise, syndicate, and produce by using the key metrics completed by the Cyber Security reviewers for every ITSM ticket. Requirements: working with computers at various levels and data security practices. High level of written and spoken English
Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and Information Technology diploma or degree Information Security certification (preferable) Experience At least
background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging maintenance Resolution of complex IT problems System security Progress reporting System engineering processes
BBL Security Products, a security wholesaler based in Brooklyn Cape Town, is looking to employ a full
production systems. Ensuring availability, performance, security and scalability of AWS production systems. Managing of critical system security by leveraging best practices and prolific cloud security solutions. Providing architecture and process improvements. Implementation of security protocols by evaluating business strategies and
headhunting and high-calibre recruitment strategies. We secure resources for a variety of clients in many industries Amazon Web Services platform, ensuring scalability, security, and optimal performance. • Deliver well architected all microservices and infrastructure adhere to security best practices. • Review AWS costs related to
families/Companies/Assets are financially sound and secure amidst unexpected events in an ever changing world ADVISOR DO? Creates and protects the financial security and wealth of others, assists clients to acheive
families/Companies/Assets are financially sound and secure amidst unexpected events in an ever changing world ADVISOR DO? Creates and protects the financial security and wealth of others, assists clients to acheive