expertise in SAP systems security hardening.
- Strong grasp of SAP security concepts and proficiency
with SAP security tools and technologies.
- Ability to monitor for and investigate security breaches
test for vulnerabilities.
- Maintenance of security posture for enterprise applications, particularly
K3/K4 Certification (advantageous).
- Formal training in SIEM Solution/s ETD (Enterprise Threat Monitor)
and accuracy.
- Ensure systems comply with security standards.
- Manage annual penetration testing
systems security hardening. - Strong grasp of SAP security concepts and proficiency with SAP security tools and investigate security breaches, and test for vulnerabilities. - Maintenance of security posture for enterprise SAP K3/K4 Certification (advantageous). - Formal training in SIEM Solution/s – ETD (Enterprise Threat Monitor) timeliness, and accuracy. - Ensure systems comply with security standards. - Manage annual penetration testing required. - Perform security remediation. - Apply and analyze impact of SAP Security Notes released. -
A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions. Previous analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions analysis. A strong technical background in Cyber Security, Cloud and Microsoft Infrastructure Solutions
on time and accuracy. Ensure your systems are security compliant. Apply Pentest findings to your systems implementation Ability and willingness to coach and give training to fellow colleagues and users when required Release
Meet with end users and gather requirements. User training & User sign off. Compiling of user and operational relevant stakeholders. Ensuring that technical training and development of the feature team is identified systems and software continuously. Conducting security checks and audits on the product. Ensuring the project. Ability and willingness to coach and give training to fellow colleagues and users when required.
Meet with end users and gather requirements. User training & User sign off. Compiling of user and operational relevant stakeholders. Ensuring that technical training and development of the feature team is identified systems and software continuously. Conducting security checks and audits on the product. Ensuring the project. Ability and willingness to coach and give training to fellow colleagues and users when required.
devices, and software comply with best practice security.
devices, and software comply with best practice security. Install public and local certificates on a variety Participate in regular staff meetings, staff training programs, and supervisory sessions, and accept networking, etc. Enterprise printing solutions. Cyber security skills in large enterprises. Managing and maintaining
following: mobile or website systems; security principles; open source security tools; programming languages;
testing. Test data management. Manual, Performance, security, and load testing. Any additional responsibilities Identification, Creation & Sanitation of Test Data Security and Reliability Testing. Technical Test Case creation