Looking for a Senior Specialist: Technology Security to start immediately on a fixed term contract. Ideal in Information Security / Computer Science 5 years experience in Technology security CISSP CISM 4years that the process to onboard and adopt the Cyber Security capabilities across the network team is adhered Provide insights into group and global cyber security solutions are met. Consulting and engagement with Apply best practices in order to provide practical security guidance to stakeholders in the market and that
1Track security,Address- 12 B 7th avenue EdenvaleWe are looking for a young enthusiastic person, preferably
facilities, fleet, document management and physical security systems and processes. To manage provision of Physical Security Management Liaise with the internal Risk Specialist and the landlord for security assessment changes to be made to the building with regard to security (i.e. alarms, monitors, metal detectors, x-ray transferred inadvertently. Implement information security classifications and declassification procedures
run 3 businesses, farming, investigations, and security systems I need someone with a driver's license
write EnglishMust have 1 years’ experience in Security Must be South African CitizenEMAIL YOUR CV TO
Preferably Node.js, Golang and or Java. Strong security background. Knowledge of common vulnerabilities Review contracts of team members for logic flaws or security issues. Research and concept work for new features
Preferably Node.js, Golang and or Java. Strong security background. Knowledge of common vulnerabilities Review contracts of team members for logic flaws or security issues. Research and concept work for new features
server, servlet containers, caching, proxies, security, CDNs Understanding of different software architectures
VNet Virtual Network Gateway Cloud Security Firewalls Network Security Groups MFA Planning, design and development Microsoft and Linux environment knowledge Install, secure, maintain and support highly available software
developing technology landscape, including information security and digital privacy. Ensure that the IT staff the required or necessary tools and strategies to secure information transmitted and stored through the consistent with agreed standards regarding the security and privacy of information transmitted and stored