Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
is currently looking for a Cyber Safety & Security Engineer within the Digital Technology Department to identify security control and/or capability gaps that impacts the organization's security posture Provide reviews and actively lead the discussions from a security standpoint Create formal written documentation patches for discovered vulnerabilities; assist security, server management, desktop, private/public cloud when necessary. Expand the use of automation in securing the environment and across multiple technology
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
highly skilled Senior Cyber Security Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
Airport for AVSEC Screeners within the Enterprise Security and Compliance Division. Key Performance Output candidates will be reporting to the Supervisor Aviation Security, and will be responsible but not limited to the (NQF 6) in Security/ Law/Risk/Compliance is recommended. Registration with Private Security Industry Regulatory
Airport for AVSEC Screeners within the Enterprise Security and Compliance Division. Key Performance Output candidates will be reporting to the Supervisor Aviation Security, and will be responsible but not limited to the (NQF 6) in Security/ Law/Risk/Compliance is recommended. Registration with Private Security Industry Regulatory
Airport for AVSEC Screeners within the Enterprise Security and Compliance Division. Key Performance Output candidates will be reporting to the Supervisor Aviation Security, and will be responsible but not limited to the (NQF 6) in Security/ Law/Risk/Compliance is recommended. Registration with Private Security Industry Regulatory
Airport for AVSEC Screeners within the Enterprise Security and Compliance Division. Key Performance Output candidates will be reporting to the Supervisor Aviation Security, and will be responsible but not limited to the (NQF 6) in Security/ Law/Risk/Compliance is recommended. Registration with Private Security Industry Regulatory
Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions instructions and support team members in achieving common security objectives. Flexibility and Availability: Willingness