both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
Solution's client is looking for a Systems Engineer - Information Security for one of their clients based in Johannesburg Senior Systems Engineer, Information Security in developing and managing information security programs related overall integrity and protection of business information security and ICT assets and is also primarily effective analytical capability in support of the Information Security Team objectives. Qualifications and Proactively monitors, investigates and reports on information security incidents, Internet use and ICT policy
and relational databases, Willing to learn AWS technologies: network security groups, cross-account communication
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
workshops with business users (up to executive level) in order to gather requirements, generate ideas to interact with the business community at all levels, from facilitating design workshops and conducting organisation's strategy, processes, information and information technology assets. The BA links and aligns and processes of an organisation to its information technology strategy. He or she documents this using manner. To bring business needs, capabilities, technology and process together in an efficient and effective
to interact with the business community at all levels, from facilitating design workshops and conducting organisation's strategy, processes, information and information technology assets. T The Process Engineer and processes of an organisation to its information technology strategy. He or she documents this using manner. To bring business needs, capabilities, technology and process together in an efficient and effective for Process Engineering and works at the highest levels of abstraction, ambiguity, and complexity within
DegreeRelevant tertiary qualification in Information technology and Minimum of 8 years of experience in risk, controls, and compliance management in a technology environment 8 years' of experience in IT Audit management in a Cyber or technology environment Knowledge of common information technology management / compliance requirements, such as Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data (PCI)/Data Security Standard. High level understanding and Knowledge of Cloud Risk, Compliance and Assurance
influence and broker conversation with executive level stakeholders to address cyber risk in a financial and maintaining target Cyber Security Maturity levels Building relevant Business Cases for key initiatives Degree or relevant tertiary qualification in Information Technology A minimum of 8 years of experience in a risk, controls, and compliance management in a technology environment At least 8 years of experience in management in a cyber or technology environment Knowledge of common information technology management and compliance
influence and broker conversation with executive level stakeholders to address cyber risk in a financial and maintaining target Cyber Security Maturity levels Building relevant Business Cases for key initiatives Degree or relevant tertiary qualification in Information Technology A minimum of 8 years of experience in a risk, controls, and compliance management in a technology environment At least 3 to 5 years of experience management in a cyber or technology environment Knowledge of common information technology management and compliance
services specifically tailored to the Network technologies within their designated region.
Job
overall performance of regional network and voice technology systems for region mining operations.