highly skilled Cyber Security Principal Lead/Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
Employment opportunity for Security Officer - Dog Handler and NKP Qualification DOG HANDLER - Must be Ensures that all areas of the property are safe and secure. - Areas of responsibilities include protection property on foot, securing personnel, assets, buildings, gates, and fence perimeter are secure in all weather conditions NKP OFFICERS - PSIRA Grade C - Grade12 - National Key Point - 2 Years Security Experience - - LOC Identified Posts - Knowledge of Security Operations and Procedure and Fire Inspection Procedures
Procurement Officer to manage our company's procurement process and activities. The procurement officer's responsibilities Proficiency in procurement software and Microsoft Office Suite. Analytical thinking and problem-solving
arrangements for all provincial bookings i.e. flight and office space bookings, hotel and restaurant reservations Flight Booking Generate invoice for out-of-town office space rentals Assisting in overseeing administration Claimant bookings for various experts Booking of office spaces Generating invoices for experts Sending
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal
plan, manage, and administer the company network security. Ensure all network components are managed in experience in IT governance and security. Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Directory. Knowledge of Cloud Security. Design, install and manage security mechanisms that protect the Upgrade systems by implementing and maintaining security controls. Protect the system by defining access Develop and implement standardised Information Security processes and procedures. Respond to internal
plan, manage, and administer the client's network security. Ensure all network components are managed in ensure compliance. Design, install and manage security mechanisms that protect the clients's network Upgrade systems by implementing and maintaining security controls; Protect the system by defining access Develop and implement standardised Information Security processes and procedures; Respond to internal to ensure compliance and correction of all IT security issues; • Conduct IT risk assessments; Assist
& Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls knowledge of information security management and policies Sound understanding of security operational processes