Khuliso Mashau is a Helping You Visually Transform Your Brand Online | Worked with Health Promoters, Harmony SGGZ and Help for Women | Founder of KLMS Digital at KLMS Digital. They is proficient in English and Tshivenda.
Klms Digital
-
FounderKlms Digital Nov 2022 - PresentNorth Holland, Netherlands. Craft compelling and engaging content through ghostwriting to breathe life into client ideas. Provide brand consulting services to elevate brands to new heights by forging distinctive and unforgettable identities. Develop captivating and conversion-focused content marketing strategies to engage audiences and achieve exceptional results. Transform social media platforms into vibrant hubs of activity through comprehensive management and strategic content creation
-
Cybersecurity ConsultantEy Jan 2018 - Aug 2019South Africa. Conducted thorough audits to identify vulnerabilities and ensure compliance with industry standards.. Managed IT risk assurance tasks, ensuring robust internal controls, risk management, and compliance.. Collaborated with an interdisciplinary team of specialists to assess and enhance the effectiveness and quality of cybersecurity measures for clients..Guided clients through understanding the cyber threat landscape and evaluating the maturity of their cybersecurity strategies. -
Information Security AnalystPerformanta Group Feb 2016 - Dec 2017Midrand, Johannesburg• Provide technical support for Credant and Safend• Patch Management coordination• Validate encryption strategy for all elements of the IT environment, in accordance with the security policies and procedures.• Complete installation of all supported devices, including implementation, testing, reporting, alerting, and operational support resource training • Create, modify, test, and implement approved changes to supported devices based upon customer requirements • Verify system status and health including encryption being active, inactive or unknown and validation of process execution• Maintain current standard operating procedures and documentation • Communicate with vendors to solution and execute system changes• Research and remediate encryption issues requiring • Remediate device that are not compliant (Computers that do not have encryption installed o Perform manual remediation where available for devices)• Create incident/request tickets to Desktop teams outlining remediation steps taken • Identify and provide countermeasures for encryption compliance • Promptly notify management and end users of any issues affecting the environment and take appropriate remedial or preventative actions • Create, validate and test emergency system availability, disaster recovery and business continuity plans• Perform periodic self-testing to ensure system performance and coverage meet expectations and capability requirements • Verify daily, monthly and ad-hoc reports are created and running properly and are distributed as needed • Attend change management calls • Participate in projects concerning supported products• Review service management tickets and work tickets concerning encryption• Manage console to configuration management database (CMDB) specifications• Mentor junior level engineers • Ensure that Service Level Agreements (SLAs) are met • Report common and repeat problems (trend analysis) to management; propose process and technical -
Csoc AnalystPerformanta Group Feb 2016 - Dec 2017South Africa• Perform monitoring via the Security Information and Event Management (SIEM) tools as well as from external sources (e.g. telephone or email).• Effective reporting on false positives and the escalation of those to the Engineer/ Lead Analyst for verification.• Undertaking in incident analysis, tracking, recording, and response.• Reporting on suspicious activity to the team lead and peers• Update the Case Management tools with evidence trails of all analysed incidents.• Escalate and provide feedback on incidents as per the SLA requirementsIdentify false-positives and work with the content author to refine content• Perform analytics on attack chain dashboards• Document malware threats and identify procedures to avoid them• Analyze programs and software using analysis programs to identify threats• Classify malware based on threats and commonalities• Ensure the provision of consistent, reliable delivery of quality contracted CSOC services and meeting SLA’s• Ability to scale and skill up to meet the demand• Providing Effective input and ability to drive a successful quality output• Ensuring the Undertake of incident analysis, tracking, recording, and response• Update the Case Management tools with evidence trails of all analyzed incidents• Handover of all analysis activities to the next shift• Escalate and provide feedback on incidents as per Incident Handling Classification Standard and process• Provide support to Lead Analyst and coordinate activities in support of Incident Containment• Keep up-to-date on the latest malware threats and keep software updated to defend against them• Train interns, personnel and other team members on best security practices• Understand tools that identify zero day cyber threats and work to protect from them• Participate in research and development of malware protection tools• Interact with the CSIRT team by assignment from Lead Analyst or Manager of Cyber Security Operations Centre. -
Solutions ArchitectInfoguardian Jul 2015 - Dec 2015Randburg• Prepare the executive summary that outlines all of the information gathered from the client inregards to their needs, as we understand them• Document the proposed security technology solution• Document the statement of work along with all labour requirement• Work with the Client Manager/Sales Specialist to prepare the pricing format that will be supplied to the customer.• Perform the actual solution design and prepare a parts list outlining equipment to be provided.• Develop and manage a proof-of-concept as such may be required• Engage all technical resources required for an accurate solution design.• Prepare a network diagram outlining the proposed solution• Document all deliverables and what constitutes a successful completion.• Review the final parts list as supplied by the Client Manager and submit all information to the applicable bid team for final assembly.• Verify the proposal’s accuracy and sign off on the final documents to be presented to the client• Assist the Client Manager during the final presentation to the customer as appropriate
-
It Security EngineerDynamic Recovery Services Llc May 2015 - Jun 2015Sandton, JohannesburgTo provide day-to-day application support of the Security offerings of DRS to include:• Host-Based and appliance based Firewall, Respond to and remediate support issues• Patch Management - Test and deployment of end-point patches• Assist with Client specific custom requirements for Managed Log Retention and Vulnerability Management Service• Work with Client to assist with technical security escalations.• Keep Client abreast of problem status, set clear expectations, provide timely follow-up to Client, and independently handle challenging Client situations on a daily basis.• Maintain knowledge of current security trends and be able to clearly communicate them to Client.• Deploy technology updates and ensure ongoing vendor support and licensing• Monitor and report on security data generated by the solution• Identify process and technical improvements for the environment• Report on ticket status and updates on issues when in progress• Provide outstanding technical support and customer service -
Service Desk Agent/ It Technical SupportStandard Bank Group Mar 2012 - Oct 2014Houghton•Provide first line support for Production systems•Providing Technical support for McAfee Products(VSE8.7)•Installing and configuring computer systems•Diagnosing and solving hardware/software faults•Logging customer/employee queries•Analysing call logs to spot trends and underlying issues•Deliver second line support service via the Service Desk. Receiving incidents and service requests from various routes including telephone and e-mail•Responsible to getting incidents for our customers resolved as quickly as possible•Responsible for staying current with system information, problems, changes and updates relevant to our customer community•Communicating and coordinating with internal departments ie.Business Operations and Call Center•Responsible for providing professional technical support to customers (both external and internal)•Actively troubleshoot to identify, assess, record, resolve and/or escalate incidents and service requests ensuring they are handled within an agreed time limit, within agreed processes and in a professional and customer sensitive manner•Actively troubleshoot to identify, assess, record, resolve and/or escalate incidents and service requests ensuring they are handled within an agreed time limit, within agreed processes and in a professional and customer sensitive manner•Monitoring of production systems, and to provide support if and when production system cease to operate•Allocation and resolution of BFM and Inclusive banking queries•Terminal Configuration•Load software, firmware & framework•Attend to service desk customer queries•Offer client support via Remote Terminal Configuration•Providing query support for Beyond Payments Back Office,Call centre & Inclusive Banking call centre•Ensure remote terminal configurationa are processed within agreed SLA•Allocation of SPAR queries to relevant department/person•Performing Swap Outs for terminals•Monitoring the production System -
It Security EngineerDynamic Recovery Services Llc Mar 2010 - Jan 2012Sandton, Johannesburg• Install, configure and troubleshoot the McAfee EPO platform• Ensure anti-virus software signatures, engine and OS patches are up to date• Ensure all devices, desktops, laptops and servers are loaded with Anti-virus agents.• Ensure all devices are loaded with up to date EPO agents.• Configure McAfee EEPC agent and ensuring that it's installed on all laptops• Configure McAfee EEPC agent and ensuring that it's installed on all laptops. Updating EEPC policies and configuring reporting.• Configuring and supporting DLP on the EPO.• Knowledge of basic Security techniques including Vulnerability Analysis, Risk Analysis, Mitigation Plans, Incident Response, Configuration Management, Systems Security Planning and Security Infrastructure Test and Evaluation.• Perform Move, Add, Change, and quality control activities related to data hardware and software components; update inventory records and reports accordingly.• Testing of New Mcafee software to be implemented in the DOD. (Procedures to be followed, Documentation that needs to be completed and submitted for approval).• Ensure Client Satisfaction and keeping customer informed on the services requested.• Establish business relationship with clients and service providers and ensure customer centricity is practiced• Monitoring and maintaining McAfee Intrushield Prevention System. • (Research, Pulling, analyzing and compiling daily attacks, Viruses and Threats Reports). Providing Technical support for mail and Web Marshal (Onsite, Online and Installation, maintaining, Troubleshooting Web and Mail Marshal) • Run Intrusion detection and penetration test on a daily basis to ensure that our network security is not compromised• Configure, monitor and remove virus, malware, adware and spyware threats through the enterprise control systems. • Conduct risk assessment to determine exposure base on assets, threats and vulnerability Virus detection, unauthorised access to Network infrastructure and Theft
Frequently Asked Questions about Khuliso Mashau
What company does Khuliso Mashau work for?
Khuliso Mashau works for Klms Digital
What is Khuliso Mashau's role at the current company?
Khuliso Mashau's current role is Helping You Visually Transform Your Brand Online | Worked with Health Promoters, Harmony SGGZ and Help for Women | Founder of KLMS Digital.
Not the Khuliso Mashau you were looking for?
-
-
Khuliso Mashau
South Africa -
-
Khuliso Diana Mashau
Roodepoort
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial