Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements:
guidance and solutions on technical problems. Ensure transition to the future mode of operation by participating formats. Operating system principles, basic IT security. Advanced experience in one or more of the following Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems Analysis
guidance and solutions on technical problems. Ensure transition to the future mode of operation by participating formats. Operating system principles, basic IT security. Advanced experience in one or more of the following Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems Analysis
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process in cloud security best practices, including identity and access management, network security, and encryption;
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process services; Ensure the security of cloud environments through the implementation of security best practices;
Online, and Teams. Solid understanding of cloud security principles and best practices. Excellent troubleshooting including virtual networks, VMs, storage, and security features. Configure and manage Azure Active Directory device management (MDM) and endpoint management and security. Administer Microsoft 365 applications and services and optimize cloud infrastructure performance, security, and cost efficiency. Troubleshoot and resolve
and disaster recovery plans, and ensuring system security and compliance with industry standards. Role & and Linux servers, ensuring optimal performance, security, and availability; Implement and manage virtualisation resolving issues promptly; Implement and enforce security policies, including firewalls, antivirus software detection/prevention systems; Conduct regular security audits and vulnerability assessments, addressing Generate and analyse reports on system performance, security incidents, and other relevant metrics; Develop
will manage user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to optimise the performance and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for
managing user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to ensure the smooth operation and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for
business requirement, user documentation and user securities settings are up to date. Management of organisational manuals. System security: Maintain user access to the system as per the system security matrix and SOP