shared services, ensure Cyber and Information Security resilience, and act as technology governance and you do? As an SAP Security Specialist, you will be responsible to provide security support within the will make you successful in this role? Manage SAP Security JIRA requests, assess and allocate JIRA requests Incident management and prompt resolution of security and authorization related issues according to Basis) teams and Business. Facilitate testing for security roles as part of the change management approval
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices meet the organization's requirements in terms of security, performance, scalability, and cost-effectiveness background in areas such as networking, databases, and security, as well as experience with cloud platforms and
Maintain and facilitate compliance with company, security, and regulatory standards. Foster innovation within Maintain and facilitate compliance with company, security and regulatory standards. Support the achievement thinking. Monitoring systems to analyse performance, security, and reliability. Developing automation scripts Hyper collaboration with different teams ie. Security, DevOps, Application teams etc. Enabling, managing monitoring techniques. Expert understanding of security and automation with regards to DevOps practices
manage scalable, optimised, supported, tested, secure, and reliable data infrastructure eg using Infrastructure Cloud). Ensure data security and privacy in collaboration with Information Security, CISO and Data Governance a high level of data accuracy, consistency and security. Performance and Optimisation: Ensure the performance
Technical Knowledge Advanced database management and security best practices Advanced automation deployments network infrastructure Database Management Computer Security Disaster Recovery & Business continuity standards
formats. Operating system principles, basic IT security. Advanced experience in one or more of the following Knowledge across multiple technologies IT Risk and security principles Multiple operating system Systems Analysis