/Information Management
- Certified Information Security Manager (CISM)
- Certified Ethical Hacker
System Security Professional (CISSP)
- Knowledge of networks, firewalls, proxies and security technical
knowledge of database and application security.
- Cyber security awareness and training.
- 5+ years
years of experience in information security.
Certifications Security Minimum 5 years maintenance and support experience in endpoint security, supporting Version 3 Process Knowledge and experience E-mail security knowledge or experience Key Performance Areas: Provide technical support, including reporting and security application software management and administration define policies/rules as they relate to e-mail security and other anti-virus, anti-malware, AV/EDR and endpoint technologies will also be required. Keep security systems configuration documentation up to date
is seeking a Senior Security Specialist to ensure sustainable IT Network Security. 1. Strategy and Planning: the enterprise's security architecture design. Lead, Plan and Implement all security and network projects projects as per the Security Strategy and Security Program. Develop, implement, maintain, and oversee enforcement policies, procedures and associated plans for system security and user system access based on industry-standard Design and implement disaster recovery plan for security systems, databases, networks, servers, and business
Purpose of the Job: Reporting to the Senior Manager: Security Services, the successful incumbent is accountable the RAF and its premises. Key Performance Areas Security Investigations Manage the conducting of investigations process where applicable. Manage the conducting of security risk assessments for the entire organisation as building security systems are provided. Policy Review and Implementation Develop and implement security plans plans and systems to secure all people on company premises and property. Manage the implementation of the
Purpose of the Job: Reporting to the Senior Manager: Security Services, the successful incumbent is accountable the RAF and its premises. Key Performance Areas Security Investigations Manage the conducting of investigations process where applicable. Manage the conducting of security risk assessments for the entire organisation as building security systems are provided. Policy Review and Implementation Develop and implement security plans plans and systems to secure all people on company premises and property. Manage the implementation of the
of all technical security areas including but not limited to cyber and data security. The purpose of this this role is to ensure ICT security integrity and technical support. Key responsibilities: - Ensure efficient - Ensure auditing of security policies and procedures. - Update cyber security policies. - Coordinate stakeholders. - Input into the development of security policies. Qualifications, Knowledge, Skills & /Information Management - Certified Information Security Manager (CISM) - Certified Ethical Hacker (CEH
to all institutes. Ensure that all systems are secured and protected to all threats i.e. effective deployment monitoring of Antivirus in the ICT environment. Review security and backup procedures and processes for improvement endpoint security, management i.e. AV and patch deployment. Ensure diagnosis and resolution of security incidents and functionality. Operational Write reports on security incidents. Participate in change control implementation qualification in an IT field. Formal Microsoft Security Certifications; MCSE. Min 5 years Systems Engineering
designing, developing, and maintaining scalable, secure cloud-based systems, primarily using AWS. This ensuring high operational quality, and implementing security measures. The engineer will collaborate with team & Develop: Architect and develop scalable, secure cloud-based systems using AWS. - Manage Lifecycle: change management, and implement lifecycle and security measures. - Support Agile Processes: Prioritize Experience with scalable, distributed systems - Security expertise in AWS services and VPC architectures
Injury supplier systems management – 20% Building, security, vehicles and related management – 20% Compliance Injury supplier systems management – 20% Building, security, vehicles and related management – 20% Compliance
Injury supplier systems management – 20% Building, security, vehicles and related management – 20% Compliance Injury supplier systems management – 20% Building, security, vehicles and related management – 20% Compliance