network and information systems against breaches, viruses, and Antispyware
network and information systems against breaches, viruses, and Antispyware. •Upgrade systems by implementing and maintaining security controls. •Protect the system by defining access privileges, control structures resources. •Develop and implement standardised Information Security processes and procedures. •Respond to •Group policy management. •National Diploma in Information Technology or relevant equivalent qualification
network and information systems against breaches, viruses, and Antispyware; Upgrade systems by implementing and maintaining security controls; Protect the system by defining access privileges, control structures resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies policies and processes; Ensure that systems and procedures follow industry standards, e.g., ISO 27000 – 27004
integrity. ✓ Creating and implementing data management systems and processes. ✓ Collaborating with different teams ✓ Bachelor's degree in Computer Science, Information Systems, or a related field. ✓ Proven experience database management systems and data visualization techniques. ✓ Familiarity with ERP systems and data extraction
Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite drives the implementation of an organisation-wide information security strategy aligned with the business objectives Contributes towards establishing and maintaining information security policies, procedures, standards, and management of information security risks across the organisation, including data, systems, networks, and assets. Implements security monitoring tools and systems to detect and respond to security threats and providing
drives the implementation of an organisation-wide information security strategy aligned with the client's business Contributes towards establishing and maintaining information security policies, procedures, standards, and management of information security risks across the organisation, including data, systems, networks, and assets. Implements security monitoring tools and systems to detect and respond to security threats and providing to executive leadership and stakeholders. Stays informed about emerging security threats and industry trends
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are and 3rd party systems housing confidential/private data. •Develop and enhance an information security management technology projects, systems, and services •Provide leadership to the enterprise's information security organisation knowledge and future vision of technology and systems. •Provide a coordinated response to sophisticated establish appropriate defensive mechanisms, review system modifications for security implications, and recommend
a Chief Information Officer / CIO to be responsible for the technology infrastructure, systems and process responsibility for the company's information technology, computer systems with duties including assessing following is required: Degree in Computer Science, Information Technology or a related field Minimum of 10 years budget Planning, deploying and maintaining IT systems and operations Overseeing relationships with vendors and develop Supervise the networks and computer systems in the company to ensure optimal performance Plan
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to in-depth analysis with stakeholders on complex information security issues and provide optimum solutions technical requirements while aligning with the information security strategy. To support the Wealth cluster Computer Science / Informatics