Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Front-End Developer

Requirements Worked on large SAAS systems with complex structures Minimum 5 years experience (React/Vue with TypeScript, Angular also accepted) Some design e...


From Network Recruitment - Gauteng

Published 25 days ago

Php Developer

PHP Developer Gauteng Looking for a skilled PHP Developer to join a dynamic team. Should you be successful then your duties might include converting statemen...


From Network Recruitment - Gauteng

Published 25 days ago

2579_Test Specialist (Advanced)

ESSENTIAL SKILLS REQUIREMENTS: · Testing and Ops Tools: Selenium, Cucumber, XRay, REST-assured, GitHub Advanced Security, Contrast Assess, Grafana k6, Karate...


From Jordan Hr - Gauteng

Published 25 days ago

Application Development Manager – Johannesburg (Hybrid) – Up To R1.4M Per Annum

If youre seeking a rewarding career as an Application Development Manager within the financial sector, then this opportunity with a leading wealth management...


From E-Merge - Gauteng

Published 25 days ago

Cyber Security Engineer - Security, Infrastructure And Application

Cyber Security Engineer - Security, Infrastructure And Application
Company:

Hr Genie


Details of the offer

Our client, a top employer to thousands of talented people is seeking a Cyber Security Engineer to join their team in Sandton on a contract basis for 6 months with possiblity of extending. The company offers extensive growth opportunities as well as the opportunity to work with a creative and dynamic team.DescriptionOur client requires use of your current Cyber Security,Infrastructure and Applications knowledge to ensure that the deployment aligns to our standards and design canvas. You will be required to guide the design and technical delivery teams on the best way in which to implement their requirements to meet their needs and the needs of the Cyber Security function. You will need to stay abreast of the products capability and conduct self study or attend courses to become experts on the current and future products capability.RequirementsDetermine who requires access to which informationPlan, coordinate and implement information security programsHelp protect against Web threats that facilitate cyber crime like malware, phishing, viruses, denial-of-service attacks, and hackingEnsure you know and follow the incident and change processesPerform Problem management analyses and duties, during the week and on weekendsPerform built as designed reviewsPrepare project documentation (guides, configuration documents, etc.)CMDB managementTracking of IT software as relating to CyberTracking of IT hardware as relating to CyberUnderstanding of AWS securityA passion for cyber security and a keen interest in ITExcellent IT skills, including knowledge of computer networks, operating systems, software, hardware and securityAn understanding of the cyber security risks associated with various technologies and ways to manage themA good working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virusThe ability to work as part of a team and to build strong relationships with staff and other relevant individualsVerbal communication skills, including presentation skills, with an abilityto communicate with a range of technical and non-technical team members and other relevant individualsTime-management and organisational skills to manage a variety of tasks, prioritise workload and meet deadlinesExcellent attention to detail, analytical skills and an ability to analyse complex technical information in order to identify patterns and trendsAn ability to work under pressure, particularly when dealing with threats and at times of high demandSkills and Experience:Strong problem-solving abilityWritten communication skills, for example to write technical reportsFlexibility and the ability to multi-task in a fast-paced atmosphereKeep up to date with the latest security and technology developmentsResearch/evaluate emerging cyber security threats and ways to manage themPlan for disaster recovery in the event of any security breachesMonitor for attacks, intrusions and unusual, unauthorised or illegal activityTest and evaluate security productsDesign new security systems or upgrade existing onesUse advanced analytic tools to determine emerging threat patterns and vulnerabilitiesEngage in ''ethical hacking'', for example, simulating security breachesIdentify potential weaknesses and implement measures, such as firewalls and encryptionInvestigate security alerts and provide incident response, including steps to minimize the impact and then conducting a technical and forensic investigation into how the breach happened and the extent of the damageMonitor identity and access management, including monitoring for abuse of permissions by authorised system usersLiaise with stakeholders in relation to cyber security issues and provide future recommendationsGenerate reports for both technical and non-technical staff and stakeholdersMaintain an information security risk register and assist with internal and external audits relating to information securityMonitor and respond to ''phishing'' emails and ''pharming'' activityAssist with the creation, maintenance and delivery of cyber security awareness training for colleaguesGive advice and guidance to staff on issues such as spam and unwanted or malicious emails.Engaging with other teams in an Agile environmentDirect experience with anti-virus software, intrusion detection, firewalls and content filteringKnowledge of risk assessment tools, technologies and methodsExperience designing secure networks, systems and application architecturesKnowledge of disaster recovery, computer forensic tools, technologies and methodsExperience planning, researching and developing security policies, standards and proceduresProfessional experience in a system administration role supporting multiple platforms and applicationsAbility to communicate network security issues to peers and managementAbility to read and use the results of mobile code, malicious code, and anti-virus softwareStrong understanding of endpoint security solutions to include


Source: Sercanto_Ppc

Requirements


Knowledges:
Cyber Security Engineer - Security, Infrastructure And Application
Company:

Hr Genie


Built at: 2024-05-01T02:53:38.020Z