Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, advises customers and the Engineering team on the security systems' maturity and resilience posture for protecting Serve as the primary point of contact for all security incidents, working with various teams to resolve timely and efficient manner. Investigate potential security breaches, conducting root cause analysis and developing prevent future incidents. Implement and maintain security controls in accordance with industry best practices
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Global Tech firm is seeking a Cyber Safety and Security Engineer to join their team in Rosebank (2 days great working environment.
The Manager, Security Platform Engineering is a seasoned managerial
operational management and support to a team of CSIRT Security Platform Engineers who are accountable for detecting
cross functional teams and learns more about new security tools and technologies that are getting onboarded
maintenance of the security tools/technologies.
The Manager, Security Platform Engineering
JHB001871-Chris-1 We are in search of an INFORMATION SECURITY MANAGER (ISM) to lead the technology operations be to continually develop the organization's IT security strategy to address both current and future business business demands. Successfully complete IT and Cyber Security projects within agreed-upon deadlines, scope, requirements. JOB DESCRIPTION: Job Title: Information Security Manager (ISM) Job Type: Permanent Job Industry: Johannesburg MAIN JOB PURPOSE: The Information Security Officer (ISM) is accountable for ensuring appropriate
issues and challenges faced by internal staff in transitioning to the new process as well as issues and challenges
fully appraised of what would be required to transition the environment, Manage the technical implementation fully appraised of what would be required to transition the environment, Liaison with Transactional Portfolio
fully appraised of what would be required to transition the environment, Manage the technical implementation fully appraised of what would be required to transition the environment, Liaison with Transactional Portfolio
expertise in SAP systems security hardening.
- Strong grasp of SAP security concepts and proficiency
with SAP security tools and technologies.
- Ability to monitor for and investigate security breaches
test for vulnerabilities.
- Maintenance of security posture for enterprise applications, particularly
and accuracy.
- Ensure systems comply with security standards.
- Manage annual penetration testing
- Perform security remediation.
- Apply and analyze impact of SAP Security Notes released.
our clients' security postures. - Assist in the development and implementation of security measures to assessments and penetration testing. - Analyze security breaches to identify the root cause and implement development of security policies, procedures, and guidelines. - Assist in the creation of security awareness - Knowledge of security frameworks and standards - Familiarity with various security tools and technologies
systems security hardening. - Strong grasp of SAP security concepts and proficiency with SAP security tools and investigate security breaches, and test for vulnerabilities. - Maintenance of security posture for enterprise timeliness, and accuracy. - Ensure systems comply with security standards. - Manage annual penetration testing required. - Perform security remediation. - Apply and analyze impact of SAP Security Notes released. - - Provide guidance to projects on SAP Security profile parameters and analysis. - Evaluate and remediate