Solution's client is looking for a Systems Engineer - Information Security for one of their clients based based in Johannesburg. The Systems Engineer must have experience in design architecture, deployment, the Senior Systems Engineer, Information Security in developing and managing information security programs overall integrity and protection of business information security and ICT assets and is also primarily effective analytical capability in support of the Information Security Team objectives. Qualifications and
industry currently requires the services of a Financial Systems Administrator to be based in JHB North. Job within the Law industry is looking for a Financial Systems Administrator who takes initiative, is willing user requests and queries, to ensure reports on systems are fit for purpose in terms of business requirements degree (Information Sciences/ IT related) an advantage Exposure to financial accounting systems training discuss your next career move in IT For more information contact: Rendani Ndou on 011 622 9526 IT Recruitment
for the purpose of organisational growth both financially and technically as well as establishing a technological development of software
 or a related field
Â
Operations Manager (Information Technology)
We are seeking an Operations Manager c; National Certificate or Technical Support NQF Level 4 SAQA ID 78966.
highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Responsibilities: Oversee the security of information systems and the company's overall security stance and guidance on security policies. Audit current systems and implement new security standards, frameworks security infrastructure of IT systems. Respond promptly to all information security incidents. Develop
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive advance and elevate the work of the Information and Communications Systems (ICS) division. The CIO manages manages and oversees the information technology (IT) strategy, policies, and operations within the university administrative oversight of the Information and Communication Systems (ICS) Division. The University is security and integrity of the university's IT systems, data, and networks. Overseeing the implementation
Australian markets with a focus on Cloud Enablement, System Integration, Software Development, Web and Mobile and Microsoft Azure 2. Software and System development 3. System integration, Data integration and migration Analytics 6. Workflow and Robotics Process Automaton 7. System Analysis and Business Analysis 8. DevOps 9. Automation Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision
Australian markets with a focus on Cloud Enablement, System Integration, Software Development, Web and Mobile and Microsoft Azure 2. Software and System development 3. System integration, Data integration and migration Analytics 6. Workflow and Robotics Process Automaton 7. System Analysis and Business Analysis 8. DevOps 9. Automation Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are and 3rd party systems housing confidential/private data. •Develop and enhance an information security management technology projects, systems, and services •Provide leadership to the enterprise's information security organisation knowledge and future vision of technology and systems. •Provide a coordinated response to sophisticated establish appropriate defensive mechanisms, review system modifications for security implications, and recommend