... activities relating to ever-evolving cyber threats. Provide technical input ... (e.g. Active Directory; Cloud Access Security Broker; database activity monitoring; ... and response; security information and event management; security orchestration, automation ...
15 days ago
... activities relating to ever-evolving cyber threats. Provide technical input ... (e.g. Active Directory; Cloud Access Security Broker; database activity monitoring; ... and response; security information and event management; security orchestration, automation ...
3 months ago
... Familiarity with offensive and defensive security practices (SOC operations). Solid understanding ... ). Certifications (one or more beneficial): Security+, CEH, CISA, CISSP, OSCP, ... Layers of a homegrown adaptive cyber defense platform. Champion and execute ...
2 days ago
... field 5+ years of experience in a cyber security role focused on delivering business ... networks Strong understanding of cyber risk management and security frameworks, such as ... identify, analyse, and resolve complex security issues in large-scale network ...
27 days ago
... systems, implementing technology and cyber- security solutions to support business objectives ... and telecommunications systems. Ensure the security, reliability, and scalability of ... and ensure a culture of security awareness. Strategic Planning and Leadership ...
21 days ago
... certifications like OSCP (Offensive Security Certified Professional), CEH ( ... CISSP (Certified Information Systems Security Professional), CISA (Certified Information ... network security, web application security, cloud security, and mobile application security. ...
3 days ago
... related to security capabilities. Technical security standard development and ... for implementation. Security architecture: Creation of security capability reference ... -end engineering of security capabilities Security Systems implementation: Implementation ...
2 months ago
... hardware & software) Network and security diagnostics, troubleshooting, and monitoring ... contract management Technical documentation Security software and hardware definition ... Performance Areas (KPAs) Network & Security Operations Maintain, monitor, and ...
2 months ago
... high availability and cutting-edge security. Youâ??ll drive the implementation ... Trust architecture and Entra ID security concepts Administering authentication protocols (Kerberos ... make a meaningful impact in cloud security and identity management, weâ??d love ...
a day ago
... Managers, MIOT Project Team, Cyber Security, Clinical Engineering, and Hospital ... Management & Compliance: Monitor security events and ensure policy adherence ... Basic cybersecurity & networking knowledge (security protocols, network infrastructure). ITIL ...
2 months ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
R 25 000
R 30 000
a month
... Information and Cyber Security company is looking for a Technical Support Specialist. Please note ...
8 days ago
... Science, Software Engineering, Information Security, or related field (mandatory). ... . Professional Certifications (preferred/required): Security: CISSP, CISM, or CISA. ... : AWS/Azure/GCP Security certifications, Kubernetes Security Specialist. DevOps/Agile: SAFe ...
23 days ago
... compliance Lead ITGC reviews, cyber risk assessments and vulnerability management ... and Leadership to foster a cyber-conscious culture across the ... of IT general controls, cyber risk frameworks, and regulatory ... an entire IT audit and cyber function Is a natural ...
2 months ago
... to executives, balancing innovation and cyber risk. Drive secure adoption of ... , data breaches, insider threats). Lead security assessments, technology deployments, and compliance ... . Develop and enforce the companies Cyber Incident Response Plan (CIRP). Oversee ...
2 months ago