Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Online, and Teams. Solid understanding of cloud security principles and best practices. Excellent troubleshooting including virtual networks, VMs, storage, and security features. Configure and manage Azure Active Directory device management (MDM) and endpoint management and security. Administer Microsoft 365 applications and services and optimize cloud infrastructure performance, security, and cost efficiency. Troubleshoot and resolve
conversions, be involved in designing and implementing secure, high-performance Java applications that accurately looking for someone with a strong commitment to secure coding practices, including adherence to PCI DSS DOM4J for XML and Simple JSON for JSON processing Security and Authentication: Knowledge of implementing authentication (2FA) systems, preferably with DUO Security and Universal Prompt and managing phone app integrations development and financial Secure Coding and Compliance: Adhere to stringent security coding standards, including
Planning Security and risk Aware, Risk Identification and rectification to possible security vulnerabilities vulnerabilities Reaction to identified Security threats on all platforms, physical and virtual Backup monitoring foundation or intermediate, ISO 27000, other IT security Training Prince2, PMP or equivalence - Advantage
Maintain and facilitate compliance with company, security, and regulatory standards. Foster innovation within Maintain and facilitate compliance with company, security and regulatory standards. Support the achievement thinking. Monitoring systems to analyse performance, security, and reliability. Developing automation scripts Hyper collaboration with different teams i.e. Security, DevOps, Application teams etc. Enabling, managing monitoring techniques Expert understanding of security and automation with regards to DevOps practices
industry standard architecture frameworks Application security Microsoft Office Suite Principles of data architecture Waterfall) Highly proficient in programming languages Secure coding practices and protocols Understanding of
ensuring high availability, reliability, and security of critical systems and services housed within collaboration skills to ensure the efficient and secure operation of data centre infrastructure supporting
operation and user satisfaction Secure Coding and Compliance: Adhere to secure coding practices and comply including PCI DSS, GDPR, and POPIA, to ensure software security and data protection Agile Development: Participate
manage scalable, optimised, supported, tested, secure, and reliable data infrastructure e.g. using Infrastructure Cloud). Ensure data security and privacy in collaboration with Information Security, CISO and Data Governance a high level of data accuracy, consistency and security. Performance and Optimisation: Ensure the performance manage scalable, optimised, supported, tested, secure, and reliable data infrastructure e.g. using Infrastructure Cloud). Ensure data security and privacy in collaboration with Information Security, CISO and Data Governance