My client is seeking a seasoned Solutions Architect with integrations and systems experience to develop high-level roadmap for the implementation of the solution.
high-level roadmap for the implementation of the solution Matrix manages Architects delivering on projects/initiatives cooperation with the Product Manager, the Senior Solution Architect plays a critical role in helping align
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes technical solutions and security tools to boost performance and security while increasing security availability
Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to company Cyber Security Strategy across the company entity. Achieve and maintain and target Cyber Security Maturity cyber programmes Design, Develop and Implement a Security Programme for company No or per target Internal findings related to company for Cyber Security Ensure a Cyber Security Incident Response Practice is in place
3-to-5-year cyber security strategy across the company Achieve and maintain and target cyber security maturity programmers. Support the design, develop and implement a security programmer for the company No or per target Internal findings related to the company for cyber security Ensure a cyber security incident response practice is in place place across the company Promote awareness of security policies, training, and the governance strategy amongst all levels of the company to ensure sound security governance is reflected across the entity Actively
plan, manage, and administer the client's network security. Ensure all network components are managed in ensure compliance. Design, install and manage security mechanisms that protect the clients's network Upgrade systems by implementing and maintaining security controls; Protect the system by defining access Develop and implement standardised Information Security processes and procedures; Respond to internal to ensure compliance and correction of all IT security issues; • Conduct IT risk assessments; Assist
highly skilled Cyber Security Principal Lead/Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
& Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls development, and implementation of automation solutions that meet business objectives. Interpret and analyse
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls