My client within the mining industry with offices based in Rosebank, Gauteng presently has an exciting overall IT operations environment, considering security, operational, and business requirements. Implement overall IT operations environment, considering security, operational, and business requirements. Conduct vulnerability assessments to identify potential security risks and prioritise patching based on criticality systems, and applications. Collaborate with the security team to evaluate the risk associated with unpatched
December 2024. This role is based on-site at the office. 750km per month - Traveling to different sites Storage hardware, Security, and on-site computer rooms. Manage risks related to IM back-office systems. Transparently technology standards and best practices for IM back-office environment. Capacity Planning involves analyzing areas for improvement. Security Planning: Developing and implementing security measures to protect servers unauthorized access, data breaches, and other security threats. Disaster Recovery Planning: Creating
Location: Pretoria Rosslyn / Menlyn / Midrand and home office on a rotational basis. Contract up to end of December teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
strategy and roadmap, aligned with the Chief Data Officer. Develop and implement data governance framework requirements for data quality, data lineage, data security, data privacy and other relevant aspects for business management improvements, set data quality, data security, data privacy, data issue remediation guidelines experience. Proficient in the use of Microsoft Office suite (Word, Excel, Access and PowerPoint). Essential experience with data quality, data lineage, data security, data privacy, data lifecycle management, data
Technologies Large-scale high-performance databases Security Patterns AWS Certifications: AWS Certified: Developer SysOps AWS Certified DevOps Pro AWS Certified Security Speciality Essential Skills Requirements: Infrastructure Kafka StepFunctions Snowflake High Performance DB Security Advantageous Skills Requirements: Experience with
Location: Pretoria Rosslyn, Menlyn, Midrand and home office on a rotational basis. The Unified Endpoint Management external providers, vendors and customers. Treat security as a first-class citizen. Work closely with stakeholders
work between Midrand, Menlyn, Rosslyn and home office. Must be willing and able to travel internationally tests, integration tests and system integration security tests. Proactively propose solutions to improve
Location: Midrand / Menlyn / Pretoria Rosslyn and home office on a rotational basis. Ability to understand complex meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
opportunity to join the client at their Midrand office, kindly submit all applications to Kyle.Govendermediro-ict Integration, performance and load testing and security testing using industry standard tools, fit for integration. Test data management. Performance, security and load testing. Evaluate test scenarios Execute REST-Assured, Soap-UI, Postman GitHub Advanced Security, Burp Suite, Contrast Assess, Grafana k6, Karate
exposure within the networking, voice and perimeter security infrastructure. Provide specialised support for environments. Certifications Desirable: CompTIA Security Cisco Certified Entry Networking Technician (CCENT) (CCNA) Cisco Certified Network Associate – Security (CCNA-Security) An undergraduate qualification (bachelor's LOW Proficiency in networking protocols, network security and information management systems is essential