R 15 000
R 30 000
a month
... -oriented, has a strong foundation in cybersecurity principles, and is eager to ... -oriented, has a strong foundation in cybersecurity principles, and is eager to ... -oriented, has a strong foundation in cybersecurity principles, and is eager to ...
16 days ago
R 15 000
R 30 000
a month
... -oriented, has a strong foundation in cybersecurity principles, and is eager to ... -oriented, has a strong foundation in cybersecurity principles, and is eager to ... -oriented, has a strong foundation in cybersecurity principles, and is eager to ...
16 days ago
R 15 000
R 30 000
a month
... -oriented, has a strong foundation in cybersecurity principles, and is eager to ... -oriented, has a strong foundation in cybersecurity principles, and is eager to ... -oriented, has a strong foundation in cybersecurity principles, and is eager to ...
16 days ago
... -date with industry trends in cybersecurity, providing input to the business ... -date with industry trends in cybersecurity, providing input to the business ... -date with industry trends in cybersecurity, providing input to the business ...
23 days ago
... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ...
24 days ago
... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ...
24 days ago
... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ... and segmentation. Collaborate with cybersecurity teams to address vulnerabilities, ...
24 days ago
R 91 667
R 116 667
a month
... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ...
25 days ago
R 91 667
R 116 667
a month
... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ...
25 days ago
R 91 667
R 116 667
a month
... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ...
25 days ago
R 91 667
R 116 667
a month
... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ... . Manage IT risks, including cybersecurity threats and vulnerabilities. Develop and ...
25 days ago
... in ensuring data security, managing cybersecurity risks, and compliance with ... Science, or a related field. A relevant cybersecurity qualification is essential. Experience: 10 ... through change. Deep knowledge of cybersecurity best practices, risk management, ...
26 days ago
... CEH. At least 5 years in cybersecurity or security engineering, with 1-2 years ... CEH. At least 5 years in cybersecurity or security engineering, with 1-2 years ... CEH. At least 5 years in cybersecurity or security engineering, with 1-2 years ...
26 days ago
... (configuration, firewalls, VLANs) Cybersecurity standards (IEC 62443, NIST ... ensuring compliance with safety, cybersecurity, and industry standards System Integration ... design deliverables, and support commissioning Cybersecurity & IT: Implement secure- ...
2 months ago
... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ...
2 days ago
... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ...
2 days ago
... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ...
2 days ago
... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ... as ERP implementations, cloud migrations, cybersecurity initiatives, or application development. Strong ...
2 days ago
... years Proposed Qualifications Include: OC: Cybersecurity Analyst (Level 5) OC: Cloud Administrator ... group: 18 – 35 years OC: Cybersecurity Analyst (Level 5) OC: Cloud Administrator ...
2 days ago
... years Proposed Qualifications Include: OC: Cybersecurity Analyst (Level 5) OC: Cloud Administrator ... group: 18 – 35 years OC: Cybersecurity Analyst (Level 5) OC: Cloud Administrator ...
2 days ago