Job Title: Information Security Analyst Location: Cape Town, Western Cape Type: Full-Time Working Hours: Seeking talented Information Security Analysts to join Information and Cyber Security team. This critical role company's security posture through continuous vulnerability assessments; incident handling; and security assessments assessments. If you have a passion for all things cyber and the skills to match, keep reading Key Responsibilities: cybersecurity anomalies; Handle the entire lifecycle of security incidents from detection to resolution and root
is looking for a Cloud Security Engineer who will provide AWS Cloud Security expertise and will be responsible responsible for the implementation of security controls. This role requires a professional who is comfortable a clear passion for security and related technologies. Clearly document security controls and processes environments Build security conformance pack and ensure alerting Implement and configure security controls in Cloud environments Ensure security compliance and implement automation of security controls in the Cloud
Client is seeking a Technical Manager Network and Security to join their team on a permanent basis 1. Strategic IMACDs (Install, Move, Add, Change, Delete). Ensure all incidents and requests are handled in compliance adherence. Ensure all SLAs are fulfilled within the contracted agreements with customers. 4.Financial Management: Science, Information Security or related field Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) 10-15 years experience in network and security Skilled in - OSPF
Primary Responsibilities: IT Operations: Monitor all infrastructure as a member of the I&O team. Provide Specialist. Security and User Management: Act as the business application security administrator for all core Assist with IT audits. Assist with quarterly security reports. Report to the I&O Operations Specialist Management: Update and maintain the asset register for all IT hardware as part of the team. Report to the I&O Operations Specialist. Qualifications: Appropriate 3/4 year IT qualification (Computer and Information Science
and the assurance of compliance with established security standards and protocols. Client Summary: The client technical support to ensure smooth functioning of all I systems. Manage IT support tickets, prioritize Teams, Intune, and Exchange. Implement and manage security policies and compliance settings within the MS365 MS365-related issues and ensure optimal performance. 4. Google Workspace Administration: Administer and support applications and services. Manage user accounts, security settings, and data compliance within Google Workspace
product. Your primary focus will be the development of all server-side logic, definition, and maintenance of Qualifications: Matric Degree or Equivalent Requirements: 4 years in PHP 2 years working with SQL Proficient knowledge Knowledge of RESTful API design KPAs: Write clean, secure, maintainable, testable, and modular codes Solve
monitoring, maintaining, supporting, and optimizing all networked software, hardware and associated operating & Microsoft Certification (MCSE). You also need 4-6 years of relevant work experience including experience enterprise systems. Ensure system connectivity of all servers, shared software, Core Technologies, and negotiate with vendors, outsourcers, and contractors to secure system-related products and services. Perform routine monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes
issues, update software, and ensure the security and efficiency of all endpoint devices. Key Responsibilities: Provide technical support and troubleshooting for all endpoint devices. 2. Install, configure, and maintain timely manner. 4. Perform routine maintenance tasks, such as software updates and security patches. 5. Monitor endpoint security solutions to protect against threats and vulnerabilities. 6. Document and track all technical Mac, and mobile operating systems. 4. Experience with endpoint security solutions, hardware troubleshooting
Requirements: Completed relevant Bachelors degree At least 4 years of relevant experience Strong proficiency in governance practices, data quality assurance, and data security Apply now to join my database For more IT jobs
behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses. Ethical Hacking) experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions and Cloud assurance. Experience in security management, security and network architecture and/or design