knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure problem-solving skills. Analyze information to identify security control and/or capability gaps that impacts the organization's
Enrolling users and maintaining system security. Controlling and monitoring user access to the database
Upgrade systems by implementing and maintaining security controls; Protect the system by defining access privileges
safeguarding data confidentiality with role-level security controls.
knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure
Paracon Key Responsibilities Monitors, investigates and reports on information security incidents, Internet use and ICT policy breaches. Perform proactive vulnerability assessments and assist with managed Security Operations Centre tasks. Conducts analyses and investigation of alleged breaches of In
Proactively monitors, investigates and reports on information security incidents, Internet use and ICT policy breaches. Administers all security solutions in the Information Security domain including, but not limited to, firewalls, IPS's, VPNs, Mail Gateways, Proxy solutions, Anti-Virus and other e
Our Client a Global Tech firm is seeking a 2 Cisco Network engineers to join their team in Johannesburg on a contract basis. They offer stability, growth, attractive rates and a great working environment.
Want to be a part of our team?
A Network Engineer is a seasoned
Our Client a Global Tech firm is seeking a 2 Cisco Network engineers to join their team in Johannesburg on a contract basis. They offer stability, growth, attractive rates and a great working environment. Want to be a part of our team? A Network Engineer is a seasoned technical professional responsi
policies Sound understanding of security operational processes and controls Demonstrable understanding of