strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed ground up by a talented group of engineers and computer scientists. With a diverse development team, our own Unique specially designed operating systems. Computer Engineer Centurion Our Client requires an applicant
Johannesburg area. BEng Computer Engineering, BEng Industrial Engineering, BSc Computer Science, BSc Information
and motivated Product Engineer with expertise in Computer/Electronic Engineering to join our client's dynamic product development strategies. Bachelor's degree in Computer Engineering, Electronic Engineering, or a related
Dockyard, based in Simons Town, has a vacancy for a Security Officer. Applications are invited from people below. PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of GRADE: B4 PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of recorded in Key Register. Perform tasks unrelated to Security and assist other sections as instructed by Management to work overtime/shifts Must have own transport Security related knowledge Effective Communication (verbal
Introduction Position Overview: As a Security Director, you will play a critical role in safeguarding lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your and Implementation: Develop, review, and update security policies, protocols, and guidelines. Ensure consistent emerging threats. Personnel Management: Supervise security staff, including hiring, training, and performance teamwork. Allocate resources effectively to meet security needs. Risk Assessment and Mitigation: Conduct
Description Our client is seeking a Security Director to join their team, based in East London or Johannesburg lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your Requirements:- Bachelors Degree in Criminal Justice, Security Management, or a related field (Masters preferred) CISSP) are advantageous Proven experience in security management, preferably in a corporate or industrial Personnel Management Risk Assessment and Mitigation Security Operations Liaison with External Agencies Background
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Dockyard, based in Simons Town, has a vacancy for a Security Officer. Applications are invited from people below. PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of GRADE: B4 PURPOSE OF THE JOB: To provide physical security services for the Dockyard with the intention of recorded in Key Register. Perform tasks unrelated to Security and assist other sections as instructed by Management to work overtime/shifts Must have own transport Security related knowledge Effective Communication (verbal
policies and procedures Sound knowledge of CCTV and security systems Background and skills in investigations
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats