teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
mohamed mediro-ict .co. za We are looking for a highly skilled, analytical Cloud Database Engineer. You database-related issues. Ensure that all database systems are secure, reliable, and compliant with industry standards
mohamed mediro-ict .co. za We are looking for a highly skilled, analytical Cloud Database Engineer. You database-related issues. Ensure that all database systems are secure, reliable, and compliant with industry standards
offers a complex platform which allows the scaling of high-performance virtual desktops and apps. Our service external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders developing rest APIs using C# and .Net. Deploying secure Azure Application services, private endpoints etc
Unit tests, Regression tests, System Integration security tests including recording of results and change understanding of network configurations, firewalls, and security protocols. Familiarity with Java EE, Angular,
on the part of business and translate them into high quality product backlog items. Structure and prioritise on the part of business and translate them into high quality product backlog items. Structure and prioritise different technologies. Identify, Assess and Mitigate risks. JIRA and Confluence. Any additional responsibilities
with quality and delivery requirements. Identify risks / impediments and proactively resolve and / or escalate
offers a complex platform which allows the scaling of high-performance virtual desktops and apps. Our service external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders
team Develop systems solutions in line with IT Security standards and other compliance topics, quality