Role: SAP Security Consultant/ Senior Consultant (Support)
Duration: 12 Months
Location: client based in Canada is looking for two SAP Security Consultants/ Senior Consultants to assist in a related
3 - 5 years experience as a SAP Security consultant
SAP GRC module experience is
than 16 offices in Southern Africa. Role: SAP Security Consultant/ Senior Consultant (Support) Duration: client based in Canada is looking for two SAP Security Consultants/ Senior Consultants to assist in a degree or related 3 - 5 years experience as a SAP Security consultant SAP GRC module experience is beneficial working Canadian hours from 15h00 - 23h00 (CAT) SAP, Security, Consultant, Support,
Internal/Counter Sales Security Technology (POS24104)
Roodepoort (West Rand)
R month plus commission
Electronic Security Company in Roodepoort is looking for an INTERNAL
candidates from the electronic or fire protection or security technology or ICT industry.
Professional experience in IT security, in particular network security cloud and Internet connectivity network infrastructure issues in the entire network security environment and create efficiencies in the implementation and knowledge to increase the Group's network security worldwide by successfully integrating the application network infrastructure issues in the entire network security environment and create efficiencies in the implementation knowledge to increase the GROUP Group's network security worldwide by successfully integrating the application
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process in cloud security best practices, including identity and access management, network security, and encryption;
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process services; Ensure the security of cloud environments through the implementation of security best practices;
and disaster recovery plans, and ensuring system security and compliance with industry standards. Role & and Linux servers, ensuring optimal performance, security, and availability; Implement and manage virtualisation resolving issues promptly; Implement and enforce security policies, including firewalls, antivirus software detection/prevention systems; Conduct regular security audits and vulnerability assessments, addressing Generate and analyse reports on system performance, security incidents, and other relevant metrics; Develop
managing user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to ensure the smooth operation and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for
will manage user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to optimise the performance and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for
facilities meet these needs Schedule upgrades and security backups of hardware and software systems Guarantee email provision Provide secure access to the network for remote users Secure data from internal and external recovery and back-up procedures and information security and control structures Implementation of new Infrastructure technologies Good understanding in Infrastructure security, Mimecast, CheckPoint, Crowdstrike, Symantec Excellent