Sales Representative to join our firearms and security wholesaler team based in Pretoria. This role involves relationships, promoting our range of firearms and security products, and driving sales growth within the should have a passion for firearms and any related security products, strong interpersonal skills, and a proven Representative within the Security industry. Strong passion for firearms and all security-related products and exceeding sales targets. Familiarity with the local security company market and industry trends. Familiarity
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
The position is responsible for promoting risk and regulatory compliance by identifying, quantifying reviewing, evaluating, and measuring risk to ensure that all risk categories are identified and managed compliance and audit requirements, approved risk tolerance, risk appetite, and strategic plans. Ensure the organization maintains an adequate and effective risk management program. Maintain an effective and “ready Continuity Plan. Risk Policies and Processes - Regular review and update of all risk policy and process
sales cycle environment for a company selling Security Equipment (Cameras and Alarms) You must be comfortable
and control identification, classification, and risk assessment)
d) Perform compliance audits
f) Create and provide relevant training
2. Secure knowledge
a) Keep abreast of all developments all stakeholders
e) Manage the process of securing and implementing training material
f) Monitor specifically
a) Draft and implement the firms RMCP, Risk Assessments and processes.
b) Manage all
Africa is looking for an Azure Infrastructure and Security Specialist to join their dynamic team. Use health up to date about security risk and mitigations to constantly strengthen the security Active participation implementation of Active Directory security concepts and IT Security Solutions in Azure Advanced network versioning systems like Git Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft Microsoft Defender products and Active Directory security best practices. Should you not receive a response
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
Employer Description
IT Company focusing on cyber security
Job DescriptionGlobal IT company is seeking
Duties