Job Title: Information Security Analyst Location: Cape Town, Western Cape Type: Full-Time Working Hours: Seeking talented Information Security Analysts to join Information and Cyber Security team. This critical role company's security posture through continuous vulnerability assessments; incident handling; and security assessments cybersecurity anomalies; Handle the entire lifecycle of security incidents from detection to resolution and root enhancements to improve the company's security posture; Develop and implement security processes, systems, and services;
is looking for a Cloud Security Engineer who will provide AWS Cloud Security expertise and will be responsible responsible for the implementation of security controls. This role requires a professional who is comfortable a clear passion for security and related technologies. Clearly document security controls and processes environments Build security conformance pack and ensure alerting Implement and configure security controls in Cloud environments Ensure security compliance and implement automation of security controls in the Cloud
is looking for a Technical Manager Network and Security. The Technical Manager is responsible for the Information Security or related field and 10 to 15 years' experience in Network and Security Critical Requirements Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Understand Understand security fundamentals and protocols (perimeter security, vulnerability, SOC, SIEM, security frameworks) with ISO27001 Certification (Information and Data Security) Good understanding of firewall UTM(Unified Threat
behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses. Ethical Hacking) experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions and Cloud assurance. Experience in security management, security and network architecture and/or design
Client is seeking a Technical Manager Network and Security to join their team on a permanent basis 1. Strategic Science, Information Security or related field Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) 10-15 years experience in network and security Skilled in - OSPF Understand security fundamentals and protocols (perimeter security, vulnerability, SOC, SIEM, security frameworks) in ISO27001 Certification (Information and Data Security) Good understanding of firewall UTM(Unified Threat
and the assurance of compliance with established security standards and protocols. Client Summary: The client Teams, Intune, and Exchange. Implement and manage security policies and compliance settings within the MS365 applications and services. Manage user accounts, security settings, and data compliance within Google Workspace management for Apple operating systems to maintain security and performance. Develop and maintain documentation support procedures. 6. Security and Compliance: Implement and enforce IT security policies and procedures
and the assurance of compliance with established security standards and protocols. The client is made up Microsoft Azure Fundamentals SC-900 - Microsoft Security, Compliance, and Identity Fundamentals MD-102 Communications Systems Engineer AZ-500 - Microsoft Azure Security Technologies Google Workspace Associate Certification Workspace environments. Strong understanding of IT security and compliance standards. Excellent troubleshooting Teams, Intune, and Exchange. Implement and manage security policies and compliance settings within the MS365
specialist third parties to continually improve security posture. This is a leadership role which requires work experience in the Cyber & Information Security discipline including 6 years in a leadership role transfer, and up-skilling. Management of key external security partner and service relationships. Process – Work Cybersecurity strategy. Take responsibility for security operations covering offence and defence, incident processes and ways of working. Translate strategic security requirements into practical solutions and drive
locally hosted interface. Key features include secure API key storage, direct order routing to exchanges tools for quick trade execution. It emphasizes security and reliability, aiming to simplify and enhance
locally hosted interface. Key features include secure API key storage, direct order routing to exchanges tools for quick trade execution. It emphasizes security and reliability, aiming to simplify and enhance