Role: The role of the Cyber Security Consultant: Operations will form part of our client’s team which which focusses on Cyber Security Operations services to businesses on our client’s Shared Network. This team the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance. Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly, and
background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune applications. Endpoint Management : Implement and enforce security policies and compliance standards on managed endpoints compatibility and seamless deployment. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging maintenance. Resolution of complex IT problems. System security. Progress reporting. System engineering processes
background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune applications. Endpoint Management : Implement and enforce security policies and compliance standards on managed endpoints compatibility and seamless deployment. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging maintenance. Resolution of complex IT problems. System security. Progress reporting. System engineering processes
tool users. Build strong relationships with Cyber security teams. Assist with enforcing risk-related policy Risk or Security or related IT field (min NQF 7). Accredited Certification in Risk/Security beneficial presentation. Technical experience in the information security domain would be beneficial. Knowledge and Skills: tool users. Build strong relationships with Cyber security teams. Assist with enforcing risk-related policy Risk or Security or related IT field (min NQF 7). Accredited Certification in Risk/Security beneficial
systems; network; communications; connectivity; security. Plan, organize, control and evaluate IT and electronic Coordinate and oversee vendors with respect to security of data, network access and backup systems. Coordinate suitable solutions. Preserve assets, information security and control structures. Requirements and skills
insights. Establish data quality standards & security measures. Translate data into understandable reports insights. Establish data quality standards & security measures. Translate data into understandable reports
accuracy, security, and usability of the data. Ensure that data is managed in a consistent and secure manner
responsible for high-level problem resolution, system security, policy implementation and monitoring. Outputs/Core responsible for high-level problem resolution, system security, policy implementation and monitoring. Outputs/Core