registration required
expertise in SAP systems security hardening.
- Strong grasp of SAP security concepts and proficiency
with SAP security tools and technologies.
- Ability to monitor for and investigate security breaches
test for vulnerabilities.
- Maintenance of security posture for enterprise applications, particularly
K3/K4 Certification (advantageous).
- Formal training in SIEM Solution/s ETD (Enterprise Threat Monitor)
and accuracy.
- Ensure systems comply with security standards.
- Manage annual penetration testing
systems security hardening. - Strong grasp of SAP security concepts and proficiency with SAP security tools and investigate security breaches, and test for vulnerabilities. - Maintenance of security posture for enterprise SAP K3/K4 Certification (advantageous). - Formal training in SIEM Solution/s – ETD (Enterprise Threat Monitor) timeliness, and accuracy. - Ensure systems comply with security standards. - Manage annual penetration testing required. - Perform security remediation. - Apply and analyze impact of SAP Security Notes released. -
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
on time and accuracy. Ensure your systems are security compliant. Apply Pentest findings to your systems implementation Ability and willingness to coach and give training to fellow colleagues and users when required Release
commitments. A combination of the below requirements will secure your position on the shortlist: legal qualification across various business areas. Conduct thorough training sessions for franchisees on compliance matters
commitments. A combination of the below requirements will secure your position on the shortlist: legal qualification across various business areas. Conduct thorough training sessions for franchisees on compliance matters
Meet with end users and gather requirements. User training & User sign off. Compiling of user and operational relevant stakeholders. Ensuring that technical training and development of the feature team is identified systems and software continuously. Conducting security checks and audits on the product. Ensuring the project. Ability and willingness to coach and give training to fellow colleagues and users when required.
Meet with end users and gather requirements. User training & User sign off. Compiling of user and operational relevant stakeholders. Ensuring that technical training and development of the feature team is identified systems and software continuously. Conducting security checks and audits on the product. Ensuring the project. Ability and willingness to coach and give training to fellow colleagues and users when required.
devices, and software comply with best practice security.