Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements including planning, submission, and execution of all changes agreed to as per published Change Control Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience ESXi Disaster Recovery/Risk Management Firewall / Security Experience Knowledge of Contact Centre Technologies of the jobs, please note your relocation plans in all applications for jobs and correspondence. Apply here
an experienced IT Manager to oversee and manage all aspects of IT for the Joburg division of the trading storage, and Telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure operational resilience. IT Security and Compliance – Develop and enforce IT security policies, procedures, mitigate Cybersecurity risks. Conduct regular security assessments and audits to identify vulnerabilities Cybersecurity best practices and ensure a culture of security awareness. Strategic Planning and Leadership –
troubleshooting system-related issues and ensuring system security and availability. You will need Certifications design, implementation, and maintenance; system security concepts and protocols and cloud computing. DUTIES: customers. Maintain system security by monitoring system activity, implementing security policies and procedures procedures, and identifying and mitigating security threats. Ensure compliance with industry and organizational Experience with cloud computing. Knowledge of system security concepts and protocols. Advantageous – Bachelor's
monitoring, maintaining, supporting, and optimizing all networked software, hardware and associated operating enterprise systems. Ensure system connectivity of all servers, shared software, Core Technologies, and negotiate with vendors, outsourcers, and contractors to secure system-related products and services. Perform routine monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes managing customer expectations. Perform server and security audits, system backup procedures, and other recovery
Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS).& 3 years' work experience scalability, re-usability, resilience & stability in all development practices and deliver feature sets that Application Developer (CKAD) or Certified Kubernetes Security Specialist CKS). AWS Associate level Certifications Experience in Kubernetes architecture, Networking, Security, Deployment, and Management. Infrastructure as technologies experience like SOAP and REST. Web Security protocols experience like OAuth, JWT, OIDC. Capable
Management – Manage Data, VoIP, and CCTV IP network. Keep all IP devices up to date with latest firmware release EIGRP, OSPF and BGP. Ensure maximum up-time. IT Security Management – Develop emergency, recovery, and data backup. Ensure URL filtering is enabled for all users. Endpoint Management and Managed AV. Ensure drive encryption. Ensure server room security. Compile yearly security report. Provide Pre- and Post-Sale Understand need and requirement of the customer, clarify all his/her questions enabling them to take an informed
as plugin conflicts, performance problems, or security vulnerabilities. Conduct thorough testing and and tools. Experience with website security and implementing security measures. Familiarity with UX/UI of the jobs, please note your relocation plans in all applications for jobs and correspondence. Apply here
This will also include replication, backups and security related to these servers and services. The ideal and related infrastructure. Ensure systems are secure and vulnerabilities are patched. Control and verify verify system backups and file archiving, ensuring all required file systems and data are successfully backed monitoring, verifying the integrity and availability of all hardware, server resources, systems, and key processes of the jobs, please note your relocation plans in all applications for jobs and correspondence. Apply here
program's growth goals while ensuring reliability, security, and robustness. You'll also collaborate closely integration / deployment Managed source control Security guidelines Controlling & minimising technical with and serve the company's wider scale goals securely with 99% uptime Guiding and managing the design of the jobs, please note your relocation plans in all applications for jobs and correspondence. Apply here