Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite drives the implementation of an organisation-wide information security strategy aligned with the business objectives Contributes towards establishing and maintaining information security policies, procedures, standards, and identification, assessment and management of information security risks across the organisation, including standards. Assesses and selects appropriate security technologies and solutions to protect digital assets. Implements
requires access to which information & Plan, coordinate, and implement information security programs. Help various technologies and ways to manage them Good working knowledge of various security technologies such of established company Relevant knowledge of information security management and policies Sound understanding and network technologies Relevant knowledge of technological advances within the information security arena business needs to technology solutions Ability to discuss and report technology and information security risk
address the clients' needs. They provide multi-technology consulting services on all aspects of application infrastructure and related technology components. Global Digital Technology (GDT) function providing total organisation. Mapping technology to EA business model Evaluate and solutioning of technology for sustainable sustainable business value. Engaging with strategic technology partners and vendors Reporting on process progress Certifications: Qualification in Information Technology or Information Systems Certification and working
escalated threats and suspicious activity affecting technology domain (servers, networks, appliances and all and learns more about new security tools and technologies that are getting onboarded. This roles also monitoring and maintenance of the security tools/technologies. The Manager, Security Platform Engineering excellence. Key Roles and Responsibilities: Analyze information to identify security control and/or capability securing the environment and across multiple technology platforms. Provide the Interface between the
Requirements: BSc (Computer Science) / BCom (Information Systems) 10 years in IT-related functions 5 years Domain required. TOGAF Certification, ITIL (Information Technology Infrastructure Library) Security Domain-related Improvement Process, Incident Management, Information Technology (IT) Infrastructure, Integration Services
enhance system reliability. Use Azure Stack technologies to develop robust software applications, adhering objectives. Evaluate and implement innovative technologies to improve business processes and product offerings Academic Qualifications and Certifications: BSc Information Systems or Computer Science equivalence 5 years applications. Expertise in utilizing Azure Stack technologies including Power BI, Logic Apps, Power Apps, guidelines Logical system design (Independent of Technology) and create Use Case Realization Documentation
to employees with technical problems and information technology issues involving desktop, laptop or network Service Management, has experience with various technologies, and possesses excellent computer, oral, and
processes for technology consulting services to ensure that all aspects of enterprise technology strategies Qualifications and Certifications: Degree in Technology and/or Business Management Relevant certification Skills Summary Business Development, Enterprise Technologies, Management Consulting, Market Analysis, Project
Proactively monitors, investigates and reports on information security incidents, Internet use and ICT policy breaches. Administers all security solutions in the Information Security domain including, but not limited to management. Researches, plans and implements information security technical solutions to meet business administers information security programs, including education and awareness, information security management and audits. Develops, reviews and maintains information security policies and procedures. Assists with
Summary Business Acumen, Customer Centricity, Information Technology Infrastructure Library (ITIL), Project