... attacks and unauthorized access Endpoint Security: protection of individual devices ... access systems, solutions and data Security Operations: monitoring, detection and ... Risk and Compliance: ensure that cyber security practices align with regulatory requirements ...
26 days ago
... ICT SECURITY SPECIALIST in Pretoria. PURPOSE OF THE JOB The ICT Security Specialist is ... and respond to security breaches. The ICT Security Specialist will also review ... security controls to protect against unauthorised access, data breaches, and other cyber ...
6 days ago
... ICT SECURITY SPECIALIST in Pretoria. PURPOSE OF THE JOB The ICT Security Specialist is ... and respond to security breaches. The ICT Security Specialist will also review ... security controls to protect against unauthorised access, data breaches, and other cyber ...
6 days ago
... Your mission? Ensure top-notch security, high availability, and seamless operations ... for an Azure Infrastructure and Security Specialist with: 5+ years of experience ... knowledge of Active Directory security concepts and IT security solutions in Azure ...
25 days ago
... : Job Title: SAP Authorization and Security Specialist Location: Netherlands Salary: To be ... dealing with SAP authorization and security from implementation to operations. Good ... IAS, IBP, SAC, Datasphere, BTP. Security and authorization support for questions ...
26 days ago
... SOC, both Defensive and Offensive security engineering. Familiarity with Infrastructure Monitoring ... or AWS experience, MSCE/CCNA, Security+, CEH, CISA, CASP, CISSP, OSCP ...
3 days ago
... safeguard critical assets. Conduct regular security assessments, vulnerability testing, and ... to maintain compliance and effective security practices. Key Requirements: ... standards. Hands-on experience with security technologies, including firewalls, intrusion ...
26 days ago
... Networks and Systems Implementing Security Protocols and Measures Continuous ... software · Firewalls · Networking · Endpoint Security Sound knowledge of · Firewalls · Networking ... · Endpoint Security Non-negotiable skills - Must have ...
26 days ago
... safeguard critical assets. Conduct regular security assessments, vulnerability testing, and ... to maintain compliance and effective security practices. Key Requirements: ... standards. Hands-on experience with security technologies, including firewalls, intrusion ...
26 days ago
... Networks and Systems Implementing Security Protocols and Measures Continuous ... software · Firewalls · Networking · Endpoint Security Sound knowledge of · Firewalls · Networking ... · Endpoint Security Non-negotiable skills - Must have ...
26 days ago
... fields, Network+, Security+ etc Requirements 2+ years previous Security Operations Centre (SOC ... ) Experience in conducting security investigations Must have a strong ... , Unix) Strong understanding of security incident management, malware management and ...
2 days ago
... fields, Network+, Security+ etc Requirements 2+ years previous Security Operations Centre (SOC ... ) Experience in conducting security investigations Must have a strong ... , Unix) Strong understanding of security incident management, malware management and ...
2 days ago
Description: Requirements: 5 Years plus in same / or similar role. Relevant tertiary education/certifications. Project management qualification. Project Management certifications such as PMP, PRINCE2, or Agile. Demonstrated ability to deliver complex ...
4 days ago
Description: Requirements: 5 Years plus in same / or similar role. Relevant tertiary education/certifications. Project management qualification. Project Management certifications such as PMP, PRINCE2, or Agile. Demonstrated ability to deliver complex ...
4 days ago
Description: Requirements: 5 Years plus in same / or similar role. Relevant tertiary education/certifications. Project management qualification. Project Management certifications such as PMP, PRINCE2, or Agile. Demonstrated ability to deliver complex ...
11 days ago
... to ongoing evaluation of cyber security policies to ensure security policy adherence • Promote ... audit remediation action implementation • Deploying cyber security awareness training collateral with innovative ...
11 days ago
... , Risk, and Compliance (GRC) Specialist to join our Information Technology ... to, ISO 27001:2022 – Information Security, Cyber Security and data protection, POPIA, GDPR ... development, implementation and updating of security and privacy policies, standards, ...
3 days ago
... Industrial Cyber Security program and vehicle security measures. Oversee IT security policy ... effectiveness. Investigate and remediate security breaches and incidents. ... Coordinate independent and group security audits. Additional Responsibilities: Implement ...
5 days ago
... Industrial Cyber Security program and vehicle security measures. Oversee IT security policy ... effectiveness. Investigate and remediate security breaches and incidents. ... Coordinate independent and group security audits. Additional Responsibilities: Implement ...
5 days ago
... management RESPONSIBILITIES Establish Enterprise Security Stance through policy, ... the effectiveness of Information Security Management Systems (ISMS) ... the effectiveness of security operations Protect the organization ... better understanding of cyber security
5 days ago