of all technical security areas including but not limited to cyber and data security. The purpose of this this role is to ensure ICT security integrity and technical support.
Management
of all technical security areas, including but not limited to cyber and data security. The purpose of of this role is to ensure ICT security integrity and provide technical support. The ideal candidate will will hold a Certified Information Security Manager (CISM) certification, with Certified Ethical Hacker Information System Security Professional (CISSP) credentials. Experience in cyber security awareness and training with over 5 years of experience in information security. RESPONSIBILITIES : Responsible for the implementation
Certifications Security Minimum 5 years maintenance and support experience in endpoint security, supporting Version 3 Process Knowledge and experience E-mail security knowledge or experience Key Performance Areas: Provide technical support, including reporting and security application software management and administration define policies/rules as they relate to e-mail security and other anti-virus, anti-malware, AV/EDR and endpoint technologies will also be required. Keep security systems configuration documentation up to date
PTA000779-BH-1 Our client based in Centurion seeks an ICT Security Technician responsible for the implementation ownership of all technical security areas, including cyber and data security. The purpose of this role role is to ensure ICT security integrity and provide technical support for the design, development, installation /Information Management Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH – Information System Security Professional (CISSP) Knowledge of networks, firewalls, proxies and security technical
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
Certifications Security+
responsibility will be to ensure the smooth operation, security, and optimal performance of both cloud-based and including mailbox management, email routing, and security. KPA's Administer, monitor, and maintain on-premises hybrid environment. Implement and maintain robust security measures for Azure, Hyper-V, Exchange, and Active
Security and Compliance:
and replica efficiency. Security and Compliance: Collaborate with the security team to implement and maintain maintain database security measures, access controls, and compliance standards within clustered and mirrored