of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Hypercheck is seeking a Group Security Manager to oversees and coordinates security operations within an organization information. The Group Security Manager will manage all operational aspects of the security department. This management of service providers for guarding and security equipment as well as training on policies and shrinkage and loss of company assets, managing security risks to an acceptable level while managing costs Key Responsibilities: Develop and implement security policies, procedures, and protocols to safeguard
BUSINESS UNIT: ICEBOLETHU SECURITY SERVICES ICEBOLETHU GROUP: HEAD OFFICE - DURBAN REFERENCE NUMBER: Assurance Group. It is also a Winner of the Standard Bank KZN - Top Brand award for 2022, a centre of excellence provider of dignified burial solutions. Icebolethu Security Services, a subsidiary Icebolethu Group is currently currently in search of a General Manager: Security Services, the successful incumbent will be responsible responsible for overseeing and managing all security-related operations and business within the Group. This role
completing relevant surveys Identify risks according to bank and departmental policies and take corrective action Architecture Design: Designing scalable, resilient, and secure cloud architectures that utilize services like cadence to deliver solutions. Designing scalable and secured data solutions and integration patterns. Requirement load balancing. Security and Compliance: Aligning cloud architecture/designs to security best practices may involve rightsizing resources, leveraging reserved instances, or adopting cost-effective architectures
Hypercheck is seeking a Group Security Manager to oversees and coordinates security operations within an organization information. The Group Security Manager will manage all operational aspects of the security department. This management of service providers for guarding and security equipment as well as training on policies and shrinkage and loss of company assets, managing security risks to an acceptable level while managing costs Key Responsibilities: Develop and implement security policies, procedures, and protocols to safeguard
your career. General Role Description The Cyber Security Analyst is responsible for monitoring, detecting Responsibilities: Monitor and analyze security alerts from various security tools and information sources to incidents. Investigate suspicious activities, security breaches, and cyber attacks to determine their to identify security gaps and propose remediation strategies. Develop and implement security standards countermeasures to mitigate risks and enhance the overall security posture. Collaborate with cross-functional teams
including enterprise systems, applications, data security, and innovation. You will play a key role in driving infrastructure, including hardware, software, network, and security.
Manage a team of IT professionals vendors and partners.
Ensure the security and integrity of all company data and systems development.
Strong understanding of data security and compliance.
ensuring system scalability, interoperability, and security. The IT Architect provides strategic direction hardware, software, networks, data management, and security components. Evaluate and recommend emerging technologies with security teams to ensure that architectural designs and implementations adhere to security best
Implementation and Administration - Database and Server security management - Database Configuration auditing and Project planning and implementation - SQL server security and general administration - SQL Reporting Services
departments. Perform preventive IT maintenance and security activities. Support network and stand-alone printers Department. Ensure compliance with company IT security rules. Perform ad hoc activities as and when required