Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

C# Asp.Net Developer

Job & Company Description: Our client is looking for a Developer to develop cutting edge products across the web and mobile-web space as well as assist and s...


From Network Recruitment - Gauteng

Published 25 days ago

Microsoft Consulting Engineer

Attention: Please note that the hiring team responsible for this position will be using the PikUniq platform for candidate screening and conducting one-way i...


From Pikuniq - Gauteng

Published 25 days ago

Installations Manager

Our growing client in the Fibre industry is looking for an experienced Installations Manager Minimum requirements: Matric Tertiary qualification will be bene...


From Dante Personnel - Gauteng

Published 25 days ago

Data Architect

These jobs were popular with other job seekersCodematch connects tech talent with leading tech companies, helping power the future of technology. We truly un...


From Codematch - Gauteng

Published a month ago

Cyber Security Engineer - Security, Infrastructure And Application

Cyber Security Engineer - Security, Infrastructure And Application
Company:

Hr Genie


Details of the offer

Our client, a top employer to thousands of talented people is seeking a Cyber Security Engineer to join their team in Sandton on a contract basis for 6 months with possiblity of extending. The company offers extensive growth opportunities as well as the opportunity to work with a creative and dynamic team.DescriptionOur client requires use of your current Cyber Security,Infrastructure and Applications knowledge to ensure that the deployment aligns to our standards and design canvas. You will be required to guide the design and technical delivery teams on the best way in which to implement their requirements to meet their needs and the needs of the Cyber Security function. You will need to stay abreast of the products capability and conduct self study or attend courses to become experts on the current and future products capability.RequirementsDetermine who requires access to which informationPlan, coordinate and implement information security programsHelp protect against Web threats that facilitate cyber crime like malware, phishing, viruses, denial-of-service attacks, and hackingEnsure you know and follow the incident and change processesPerform Problem management analyses and duties, during the week and on weekendsPerform built as designed reviewsPrepare project documentation (guides, configuration documents, etc.)CMDB managementTracking of IT software as relating to CyberTracking of IT hardware as relating to CyberUnderstanding of AWS securityA passion for cyber security and a keen interest in ITExcellent IT skills, including knowledge of computer networks, operating systems, software, hardware and securityAn understanding of the cyber security risks associated with various technologies and ways to manage themA good working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virusThe ability to work as part of a team and to build strong relationships with staff and other relevant individualsVerbal communication skills, including presentation skills, with an abilityto communicate with a range of technical and non-technical team members and other relevant individualsTime-management and organisational skills to manage a variety of tasks, prioritise workload and meet deadlinesExcellent attention to detail, analytical skills and an ability to analyse complex technical information in order to identify patterns and trendsAn ability to work under pressure, particularly when dealing with threats and at times of high demandSkills and Experience:Strong problem-solving abilityWritten communication skills, for example to write technical reportsFlexibility and the ability to multi-task in a fast-paced atmosphereKeep up to date with the latest security and technology developmentsResearch/evaluate emerging cyber security threats and ways to manage themPlan for disaster recovery in the event of any security breachesMonitor for attacks, intrusions and unusual, unauthorised or illegal activityTest and evaluate security productsDesign new security systems or upgrade existing onesUse advanced analytic tools to determine emerging threat patterns and vulnerabilitiesEngage in ''ethical hacking'', for example, simulating security breachesIdentify potential weaknesses and implement measures, such as firewalls and encryptionInvestigate security alerts and provide incident response, including steps to minimize the impact and then conducting a technical and forensic investigation into how the breach happened and the extent of the damageMonitor identity and access management, including monitoring for abuse of permissions by authorised system usersLiaise with stakeholders in relation to cyber security issues and provide future recommendationsGenerate reports for both technical and non-technical staff and stakeholdersMaintain an information security risk register and assist with internal and external audits relating to information securityMonitor and respond to ''phishing'' emails and ''pharming'' activityAssist with the creation, maintenance and delivery of cyber security awareness training for colleaguesGive advice and guidance to staff on issues such as spam and unwanted or malicious emails.Engaging with other teams in an Agile environmentDirect experience with anti-virus software, intrusion detection, firewalls and content filteringKnowledge of risk assessment tools, technologies and methodsExperience designing secure networks, systems and application architecturesKnowledge of disaster recovery, computer forensic tools, technologies and methodsExperience planning, researching and developing security policies, standards and proceduresProfessional experience in a system administration role supporting multiple platforms and applicationsAbility to communicate network security issues to peers and managementAbility to read and use the results of mobile code, malicious code, and anti-virus softwareStrong understanding of endpoint security solutions to include


Source: Sercanto_Ppc

Requirements


Knowledges:
Cyber Security Engineer - Security, Infrastructure And Application
Company:

Hr Genie


Built at: 2024-04-18T07:34:35.312Z