skilled and detail-oriented Information Security Officer with experience in safeguarding developing, implementing, and managing comprehensive security programs to protect against cyber threats.Â
What and successful delivery of the companies Cyber Security Strategy.
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
“Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 sector is looking for a professional Information Security Officer. The business’ core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems Information Security Manager KPAs 5 years’ experience in Cyber Security Framework Knowledge of Security best
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
providing secure cloud transformation by combining Microsoft cloud technology with cyber security, and managed ensure, stability, availability, performance and security of services Maintaining documentation quality and assess their effectiveness Oversee and test security measures, such as access authentication and disaster Familiarity with access control models and network security. Knowledge of Cisco, Juniper and Fortigate network
providing secure cloud transformation by combining Microsoft cloud technology with cyber security, and managed ensure, stability, availability, performance and security of services Maintaining documentation quality and assess their effectiveness Oversee and test security measures, such as access authentication and disaster Familiarity with access control models and network security. Knowledge of Cisco, Juniper and Fortigate network
across the organisation Ensure adherence to data security and privacy regulations Share data architecture Understanding of data governance, quality, and security regulations Strong understanding and experience
business needs. Develop scalable, reliable, and secure IT architectures that support the organisation's practices in system configuration, networking, security, and performance optimization. Mentor and train Monitor network performance to ensure robust and secure connectivity. Stay up to date with emerging technologies customizations Networking: LAN/WAN VPN Firewall and Security Management Network Monitoring Tools (Wireshark
experience) to craft innovative, scalable, and secure applications. If you thrive on creativity, collaboration Reporting and Logging tools. Ensure application security by implementing IAM roles and using Google Secret deployed applications. Commitment to maintaining high security standards, utilizing IAM roles and GSM. As Specialist