We are looking for Security Officers. Responsibilities – Adhering to principles & values. – Applying members Qualifications and Experience – Grade 11 – Security Couse will be advantage. – Prisa Grade A certificate computer skills( Ms office &SACO) The post Security Officers appeared first on freerecruit.co.za
network infrastructure issues in the entire network security environment and create efficiencies in the implementation and knowledge to increase the Group's network security worldwide by successfully integrating the application Professional experience in IT security, in particular network security cloud and Internet connectivity
leveraging cutting-edge technology to ensure top-notch security in cloud environments? Our client is seeking a DevOps Engineer specializing in Cloud Network Security to join their dynamic team You will find solutions network infrastructure issues in the entire network security environment and create efficiencies in the implementation knowledge to increase the BMW Group's network security worldwide by successfully integrating the application
for a professional Principal Specialist: Cyber Security contract role for 12 months. Desirable: An industry and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. At Protection and Payment Card Industry (PCI)/Data Security Standard. High level understanding and Knowledge operating multiple security programs, projects, and initiatives and related security tooling An ability understanding of Tech Security risks and mitigating solutions A diverse security background with knowledge
qualified Technical Trainer in the field of Cyber Security Analysts . PURPOSE: Are you passionate about cybersecurity and eager to shape the next generation of Cyber Security Analysts? We are looking for a dedicated and knowledgeable Technical Trainer to join our team as a Cyber Security Analysts Facilitator. FORMAL EDUCATION: NQF Level industry-recognized qualification (Specializing in Cyber Security) EXPERIENCE: Minimum of 1 year of experience in Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) CompTIA Security Certified Information
implementation of Active Directory security concepts and IT Security Solutions in Azure
- Advanced
systems like Git
- Experience in setting up IT Security, especially with Zero Trust solutions, Microsoft
Microsoft Defender products and Active Directory security best practices
- Teamwork and strong internal
availability and the highest state-of-the-art security are key success factors in our daily work. As
skilled and experienced Security Operations Manager to oversee and enhance our security operations. The successful managing security personnel, developing security protocols, and ensuring the safety and security of our and motivating a diverse security team. Ability to develop and implement security policies, procedures, Assessment and Management: Expertise in conducting security risk assessments and developing risk mitigation potential security threats and vulnerabilities and implementin effective countermeasures. Security Operations
and eager to shape the next generation of Cyber Security Analysts? We are looking for a dedicated and knowledgeable
Technical Trainer to join our team as a Cyber Security Analysts Facilitator.
skilled and experienced Security Operations Manager to oversee and enhance our security operations. The successful managing security personnel, developing security protocols, and ensuring the safety and security of our and motivating a diverse security team. Ability to develop and implement security policies, procedures, Assessment and Management: Expertise in conducting security risk assessments and developing risk mitigation potential security threats and vulnerabilities and implementin effective countermeasures. Security Operations
Responsibilities:
Enterprise Security Architecture Development
Develop
/>Develop and maintain an Enterprise Security Architecture for Liberty and/or a multifunctional shared
/>Produce Enterprise Security Architecture Recommendations in alignment with security industry best practices
practices.
Develop and sustain the Information Security Policy Framework.
Engage with Business and
Areas to understand and guide security requirements.
Present Security Architecture Artefacts at various