Candidate Requirements:
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Endpoint Protection, DLP, Vulnerability Scanning, AD, Windows OS, Linux OS, Network and Wi-Fi administration Implement effective security controls to protect against threats. Develop Information Security policies to guide
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working
and security of a diverse community? We are excited to announce a vacancy for a dedicated Security Guard Guard to join our team. As a Security Guard with us, you will play a crucial role in safeguarding our customers' of both customers and employees. In addition to security duties, you will also have the opportunity to surrounding areas. If you are committed to excellence in security services and take pride in maintaining a safe this position. Property Protection: Ensure the security and safety of the audiology practice's premises
and security of a diverse community? We are excited to announce a vacancy for a dedicated Security Guard Guard to join our team. As a Security Guard with us, you will play a crucial role in safeguarding our customers' of both customers and employees. In addition to security duties, you will also have the opportunity to surrounding areas. If you are committed to excellence in security services and take pride in maintaining a safe this position. Property Protection: Ensure the security and safety of the audiology practice's premises
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment