We are looking for a Security Engineer for a company based in Cape Town. This is a remote role. Your guaranteeing that their platforms maintain robust security measures while upholding their scalability and Develop and maintain security features (pentests, firewalls, authentication) Conduct security reviews of software Automate security anomaly detection and alerting Investigate security incidents and innovate security solutions solutions Strong understanding of security risks and mitigations Proficiency in backend development, IP
division of Datacentrix is looking for an Information Security Specialist for one of their client based in Centurion contract. The Security Specialist must have atleast 5 years' experience in IT governance and security . The purpose manage, and administer the company's network security. Ensure all network components are managed in experience in IT governance and security Certifications in ITIL foundation, Security, CISM, SCCM and COBIT Knowledge Knowledge of Cloud Security Responsibilities: Design, install and manage security mechanisms that protect
division of Datacentrix is looking for an Information Security Specialist for one of their client based in Centurion contract. The Security Specialist must have atleast 5 years' experience in IT governance and security . The purpose manage, and administer the company's network security. Ensure all network components are managed in experience in IT governance and security Certifications in ITIL foundation, Security, CISM, SCCM and COBIT Knowledge Knowledge of Cloud Security Responsibilities: Design, install and manage security mechanisms that protect
Description Information Security Services Development of Information Security Services capability and and to communicate feedback to enable associated security risk management. Perform Vulnerability testing compliance to security policies and standards. Develop and/or align information security policies to identify that proper IT security and information management measures are in place. Perform security audits and clean-ups policies and procedures. Document the information security principles and guidelines for application software
they need in terms of security. Will be working for Good and Well known Security Companies. Previous experience sales consultants in the Security Industry. Previously working/selling for a Security Company is a must. have 2 - 4 years of experience selling in the Security Industry (Guarding/Armed Response) Must have
infrastructure. This pivotal role involves managing the transition from the current shared IT environment to an to manage IT controls and oversee information security and compliance efforts. Human Capital Management identify and manage risks related to IT systems, data security, networks, and maintenance. Develop and implement related to IT initiatives, ensuring a smooth transition during transformation projects, new acquisitions
Work with cross-functional teams to map and transition traditional processes to digital processes. Ensure people systems including risk management, cyber security, maintenance, and architecture. Represent the
Information Security Officer , Manager and / or Consultant . Security CEH Experience in Cyber Security Architecture PAM. Technical security design and integration. Comprehensive background of cloud security architecture understanding of IT Infrastructure Good understanding of Security (FW, IPS, EPS) Good understanding of Microsoft Infrastructure Security – Firewalls, IPS, Endpoint Security, email, and application security. Qualifications: Qualifications: 5 years' relevant Information Security experience, at a technical level. Relevant Qualification
they need in terms of security. Will be working for Good and Well known Security Companies. Previous experience sales consultants in the Security Industry. Previously working/selling for a Security Company is a must. have 2 - 4 years of experience selling in the Security Industry (Guarding/Armed Response) Must have
conducting audits and inspections of various sites, security cameras, alarms, and sensors; access control protocol; Implement policies and procedures related to safety, security, surveillance, and loss prevention Oversee loss Implement safety and security policies; ensure compliance Oversee physical security measures Implement and direction to staff members Monitor facility security plans and procedures Manage budgets Monitor all and procedures Meet with Department Managers and Security to discuss methods of prevention and loss control