Certifications Security Minimum 5 years maintenance and support experience in endpoint security, supporting Version 3 Process Knowledge and experience E-mail security knowledge or experience Key Performance Areas: Provide technical support, including reporting and security application software management and administration define policies/rules as they relate to e-mail security and other anti-virus, anti-malware, AV/EDR and endpoint technologies will also be required. Keep security systems configuration documentation up to date
Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
of all technical security areas including but not limited to cyber and data security. The purpose of this this role is to ensure ICT security integrity and technical support.
of all technical security areas, including but not limited to cyber and data security. The purpose of of this role is to ensure ICT security integrity and provide technical support. The ideal candidate will will hold a Certified Information Security Manager (CISM) certification, with Certified Ethical Hacker Information System Security Professional (CISSP) credentials. Experience in cyber security awareness and training with over 5 years of experience in information security. RESPONSIBILITIES : Responsible for the implementation
/Information Management
- Certified Information Security Manager (CISM)
- Certified Ethical Hacker
System Security Professional (CISSP)
- Knowledge of networks, firewalls, proxies and security technical
knowledge of database and application security.
- Cyber security awareness and training.
- 5+ years
years of experience in information security.
Purpose of the Job: Reporting to the Senior Manager: Security Services, the successful incumbent is accountable the RAF and its premises. Key Performance Areas Security Investigations Manage the conducting of investigations process where applicable. Manage the conducting of security risk assessments for the entire organisation as building security systems are provided. Policy Review and Implementation Develop and implement security plans plans and systems to secure all people on company premises and property. Manage the implementation of the
Purpose of the Job: Reporting to the Senior Manager: Security Services, the successful incumbent is accountable the RAF and its premises. Key Performance Areas Security Investigations Manage the conducting of investigations process where applicable. Manage the conducting of security risk assessments for the entire organisation as building security systems are provided. Policy Review and Implementation Develop and implement security plans plans and systems to secure all people on company premises and property. Manage the implementation of the
A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
of all technical security areas including but not limited to cyber and data security. The purpose of this this role is to ensure ICT security integrity and technical support. Key responsibilities: - Ensure efficient - Ensure auditing of security policies and procedures. - Update cyber security policies. - Coordinate stakeholders. - Input into the development of security policies. Qualifications, Knowledge, Skills & /Information Management - Certified Information Security Manager (CISM) - Certified Ethical Hacker (CEH
Server/Network, SIP School, or their equivalents. Supplementary certifications in network security or cloud technologies