highly skilled Senior Cyber Security Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership effective and comprehensive cyber security programme. The principal lead/specialist must be able to influence proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
operations of BTS security activities. Ensure adherence to SLAs in terms of BTS Security operations and
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
Calling ALL Linux System Engineers Do you want to indulge in the perks of REMOTE WORK Are you passionate passionate about Linux systems and eager to contribute your expertise to a leading financial institution institution? We are seeking a skilled Linux Systems Engineer to join our dynamic team at one of South Africa's Between 3-5 years' experience working on Linux. ZVM Systems Red hat Linux Satellite VMware Azure AWS Chef Business
5 years of experience in Linux based operating systems 2 years of experience in Docker or Kubernetes environment Installation of Redhat Linux Installation of Linux virtual guests – Linux and Microsoft Management installation,upgrades Upgrades of Redhat Linux systems Linux Kernel management and Upgrades Disk configuration configuration, extension and management of Redhat Linux Operating Systems LUKS encryption if disks Adding partitions and logical volumes Creating and modifying linux file systems LUKS encryption if disks iScsi configuration
seeking a highly skilled and motivated Linux Technical Manager to join our team. The Linux Technical Manager, you will design and implement detailed solutions of Linux compute the company's current-state and future-state Linux based infrastructure technology solutions and innovations hat you will do:
monitor, and remediate ICT security issues.
Cyber Security Specialist required on a Fixed Term Contract in Midrand lending sector. A Deep understanding of cyber security practices and trends as well as leadership skills maintaining an effective and comprehensive cyber security program.
Requirements: and Minimum of 8 + years of experience in Cyber Security role where you meet business deliverables.
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate