looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
day administration. • Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. • Maintains the business-as-usual activities software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication operate tools for cloud storage management, high availability, cloud migration, and optimization of cloud
One of our clients has a vacancy available for a Head Chapter Lead QA to join their dynamic team in collaboratively defined and codified, to banking grade security, maintainability and defined architecture.
network in Pretoria, including updates, patching, security and backups. He/she will act as a section's purchasing Information Resource Management (IRM) and Diplomatic Security (DS). This includes the following; Performs hardware Responsible for the smooth operations and overall security and functionality of the various Databases, including applications. Installs all upgrades, patches and fixes to secure data. Makes configuration changes to affected servers the following: Ensure the DoS configuration and security standards for SharePoint sites are followed. Ensure
collaboratively defined and codified, to banking grade security, maintainability and defined architecture. The resource allocation and availability to assure productive and sustainable use of available resources taking consideration customer demand versus resource availability i.e. resource and capacity management. Responsible Must have own and reliable transport. Reliable and secure home internet. Personal Attributes Self-Motivated
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
and update operating systems, applications, and security patches. Monitor system performance and troubleshoot uninterrupted operation. Implement and enforce security measures to protect against unauthorized access system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote strong understanding of IT systems, networks, and security principles. Proficiency in administering Windows protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
and improve application performance, and high availability features. ·Create unit and integrated system and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and
and improve application performance, and high availability features. ·Create unit and integrated system and other tools for documentation. Knowledge of security vulnerabilities (OWASP top 10) and working knowledge solutions. Monitoring or optimizing the performance, security, backup, recovery or integrity of web server and