Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements:
highly skilled and experienced Engineering Lead: Security to join our client on a 12-month renewable contract Collaborate with cross-functional teams to identify security needs and develop solutions Develop and implement to improve the overall security posture of the company Conduct regular security assessments and audits remediation plans Stay up-to-date with the latest security trends, technologies, and best practices Manage industry standards and regulations related to security Qualifications: Bachelor's degree in Computer
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process in cloud security best practices, including identity and access management, network security, and encryption;
while overseeing the health, safety, hygiene and security of the staff/clients who access those areas. Conduct checking/maintenance of security and fire alarms in all buildings/facilities; Manage security of each building/facility building/facility, liaising with security service providers and handling incidents as and when they arise while while also improving security of the units through preventative checks; Liaise with/management of pest environment and at a similar level SHEQ Maintenance Security Skills Computer literacy Planning Administration
continuous integration. Security Savvy: Implement SSL encryption and other web service security measures. Back-End expertise. Knowledge of SSL encryption and web service security. Exposure to enterprise-wide service integration
infrastructure as code (IaC), monitoring performance and security, automating deployment processes, and ensuring services; Ensure the security of cloud environments through the implementation of security best practices; features, and best practices; Conduct regular security audits and vulnerability assessments of cloud on cloud infrastructure usage, performance, and security incidents; Identify opportunities for process services; Ensure the security of cloud environments through the implementation of security best practices;
Online, and Teams. Solid understanding of cloud security principles and best practices. Excellent troubleshooting including virtual networks, VMs, storage, and security features. Configure and manage Azure Active Directory device management (MDM) and endpoint management and security. Administer Microsoft 365 applications and services and optimize cloud infrastructure performance, security, and cost efficiency. Troubleshoot and resolve
and disaster recovery plans, and ensuring system security and compliance with industry standards. Role & and Linux servers, ensuring optimal performance, security, and availability; Implement and manage virtualisation resolving issues promptly; Implement and enforce security policies, including firewalls, antivirus software detection/prevention systems; Conduct regular security audits and vulnerability assessments, addressing Generate and analyse reports on system performance, security incidents, and other relevant metrics; Develop
type="circle">
will manage user accounts, licenses, permissions, security settings, and compliance policies within M365 within a team to optimise the performance and security of M365 services. Role & Responsibilities: M365 Admin Center; Configure and maintain M365 security and compliance settings, including Data Loss Prevention M365 governance and best practices to ensure a secure and efficient environment; Monitor and optimise analyse reports on M365 usage, performance, and security incidents; Provide input and recommendations for