on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This is at the heart of our security operations, offering the chance to shape security architecture, deploy with clear data driven results for use during security assessments, incident analysis and root cause Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes. Monitor networks and connected devices for security issues. Proactively respond to and report on DLP
escalation including printers, digital cameras and CCTV.
HRIS, analyzing data, ensuring data integrity and security, and collaborating for system enhancements. Key statistical analysis, ensuring data accuracy and security, conducting audits, and staying updated on HRIS for stakeholders, maintaining data accuracy and security, and collaborating with cross-functional teams Specialist, the job holder is expected to: Solve most operational and current and future skills requirement problems applications resolve all design inconsistencies and operational and logistical problems within the ambit of responsibility
IT professionals to ensure the efficient operation, security, and optimization of end-user computing systems infrastructure (VDI). •Define and enforce standard operating procedures (SOPs) for desktop support, incident standards, security policies, and budgetary constraints. •Implement and enforce security measures to environment. •Strong technical expertise in desktop operating systems (Windows, macOS), productivity applications
business operations and achieve more effective and cost beneficial enterprise-wide IT operations. KEY RESPONSIBIITY business operations and achieve more effective and cost beneficial enterprise-wide IT operations. Overseeing with company managers on internal and external operations that are impacted by the capture, storage, processing dissemination of information. Ensure that the security of the information systems is paramount in the lifecycle in adherence to all corporate cyber security standards. EDUCATION, EXPERIENCE & TRAINING:
Python. Adhere to industry standards and ensure secure coding practices, encompassing development methodologies Participate in design reviews, providing input to ensure security and Corporate Architectural Standards are incorporated application design specifications, ensuring inclusion of security requirements and interface specifications. Analyze resources and costs Knowledge of DevOps (Development Operations) structure, complex environments Advanced knowledge protocols, SDLC (software development life cycle) and security principals Experience with SQL data structure
achievement of SPAR Space Management's business operations. KEY PERFORMANCE AREAS System Design: Design updates, and upgrades to ensure optimal performance, security, and compliance with industry standards. Create documentation, and user manuals. Security & Compliance: Adhere to security best practices in software development development, including secure coding practices and vulnerability assessments to protect systems and data data. Implement and enforce security measures to protect sensitive data within the space planning systems
Responsible for the performance, integrity and security of databases as well as being involved in the needs of users and monitoring user access and security; Monitoring performance and managing parameters technical, applications and operational staff to ensure database integrity and security Commissioning and installing formal and informal training programs. Internal Operations Suggest areas for improvement in internal processes Logins as well as have strong knowledge in Database Security SSIS, SSRS and Analysis Services experience would
keeping all systems up to date with patches and security fixes, and helping end-users do their job more long-term fault, configuration, performance and security management of Desktops systems Install, configure Server Administration - Active Directory, Data Security, Group Policies etc. - Installation and troubleshooting knowledge The successful candidate should be able to operate at a corporate level and be able to translate business
network devices in response to newly identified security threats. Assists with software and hardware upgrades datacentres. Actively participates in various network security-related activities. Provides end-user support and recovery. Documents IT services, systems, operational procedures, network topology, and hardware inventory administration Microsoft Defender / Bitdefender / Mimecast security administration Microsoft Active Directory administration