Our client is an international integrated security solutions provider who requires a seasoned operations achieved cost effectively and that the company's security procedures are applied throughout the branch. best practice ROCC and compliance Effective Security and Risk Management for the branch Ensure that all procedures and standards (including health and safety, security, personnel, finance and transport) are maintained Adhere to group and company standards on risk and security mitigation and control on the following areas:
governance processes to identify and mitigate areas of risk and non-compliance
• Participate in the development of the IT risk-based audit plan and strategy
• Understand
the organisation’s IT business and various system risks, and processes and policies
• Review IT application
application controls , general controls, access security, change control, configuration management, IT
based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools
based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly established change management processes Perform risk assessments and impact analysis for proposed network traffic for security threats and vulnerabilities, and take proactive measures to mitigate risks Work closely
based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly established change management processes Perform risk assessments and impact analysis for proposed network traffic for security threats and vulnerabilities, and take proactive measures to mitigate risks Work closely
behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant Certification in risk, information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions Third-party Risk management. Conducting Risk assessment and Cloud assurance. Experience in security management
guests to avoid possible security risks. Notifies management and/or security of
suspicious behavior
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology performance tune production databases while ensuring high levels of data availability. This individual is business user needs. Perform database transaction and security audits. Establish appropriate end-user database stats, backups Responsible to identify and manage risks within your environment. Qualifications Matric Degree issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology performance tune production databases while ensuring high levels of data availability. This individual is needs.
Qu
issues, log shipping issues, connectivity issues, security issues etc.
personnel policies, Equal Employment Opportunity, security, and safety procedures.
Workplace Safety/Security: