Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Conduct (relevant or in a similar role) 4-6 years related IT security experience and a minimum of 4 years in penetration stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Required network protocols, cryptography, and application security. Proficiency in scripting languages (e.g., Python
development. An exciting opportunity exists for an IT Security Operations Engineer at AVI Limited IT Shared Services Apply technical IT Security Infrastructure expertise and tools to ensure the security of AVI IT operations Implement, Manage, Maintain and Administer AVI's Security Infrastructure and Systems Implement and optimise effective alerting and reporting with regards to security incidents and vulnerability assessments Play lead all ITSS with regards to IT Security Operations. Line Manager : IT Security Operations Team Lead Number
Client is looking for a Young Afrikaans speaking Security Engineer. This will be a 3-6 month contract. Will Will be involved with: Firewalls Networks Cloud security. Must have: Matric BCom Informatics Degree or experience working with Firewalls, Networks and Cloud Security.
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Conduct (relevant or in a similar role) 4-6 years related IT security experience and a minimum of 4 years in penetration stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Required network protocols, cryptography, and application security. Proficiency in scripting languages (e.g., Python
PSIRA Grade A Security Manager Risk Information Support- Gauteng Formation and Support Bachelor’s Degree Degree in Security Risk Management, Business Management OR B.Tech Degree equivalent OR related field. Must more than 6 years management experience within a Security or related environment. Have a Management Development Certificate essential Working experience gained in Security Risk Management principles and practices Computer and timeous intelligence to support the overall Security and Company objectives Design Implement appropriate
highly experienced General Manager: Technology Security to join their team in Roodepoort, Johannesburg developing and implementing a comprehensive technology security strategy and framework, including developing and Organisation's technology security, together with proactively implementing security measures and controls Develop and implement a comprehensive technology security strategy and framework for the Organisation, aligned aligned with the Group's Information Security strategy. Oversee the development and implementation of
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. As a Specialist, you will be responsible for leading complex security assessments and penetration testing projects to stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Education: following: Certified Ethical Hacker (CEH). Offensive Security Certified Professional (OSCP). Certified Information
rience with security standards and their implementation
stakeholders.