Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
upholding the highest standards of integrity and security.
Key Responsibilities:
highly skilled Senior Cyber Security Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
Position: Cyber Security Engineer Hire Resolves client is seeking a highly skilled and experienced Cyber Cyber Security Engineer to join their team in Middelburg, Mpumalanga. The successful candidate will be responsible for monitoring, assessing, and implementing security measures to protect their organisation's systems maintain security measures to protect computer systems, networks, and data Conduct regular security audits monitor security systems, and investigate security breaches Develop and implement security policies