Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite rates and a great working environment.
Key Roles and Responsibilities:
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite attractive rates and a great working environment. Key Roles and Responsibilities: Determine who requires & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various
Network Security Support Engineers to join a highly motivated and energetic team of security specialists specialists. The range of security technologies used by customers typically includes next generation firewalls SDWAN, threat prevention, secure web gateways, CASB, authentication and end point protection. Specific responsibilities would include: Administration and configuration of security technologies Support and troubleshooting System Min 2 years full-time experience working with security technologies – (Fortinet experience an advantage)
Junior PSIRA B Mine Security Risk Information Officer Reporting to the Security Information Coordinator Coordinator Must have a National Certificate Security Risk Management (NQF level 5) or equivalent. Must have working experience in security audit techniques, in order to identify security weakness. Working experience Working experience and skill with regards to security systems. Participate in Information/Intelligence various networks for analysis to support the overall Security Information objectives. Collect information/intelligence
attractive rates and a great working environment. Key Roles and Responsibilities: Contributes towards the implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data relationships. Promotes a culture of security awareness among employees through training, education, and regular communication
rates and a great working environment.
Key Roles and Responsibilities:
management, Infrastructure management data analysis, security or product development OR equivalent experience Infrastructure Management, stakeholder engagement, security, and analytics or similar Passion for building of IT infrastructure management while playing a key role in driving business growth through technical infrastructure to ensure performance, reliability, and security. Oversee the design, implementation, and maintenance storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system setup of security cameras. Remote desktop support for users in remote locations. Train new and existing strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system setup of security cameras. Remote desktop support for users in remote locations. Train new and existing strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
services to our business and clients The company is a key player in the travel retail sector, specializing documentation Architecture overviews and diagrams Security policies and procedures System policies and procedures Continuity Plan End user documentation End user training Support team documentation System monitoring and no supporting documentation is required at this point, this will be requested later. IMPORTANT: We specialize