standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure Infrastructure and Operations department to drive the security vision and strategy forward. Role Overview: the Information Security Officer, you will be the linchpin for information security efforts, responsible responsible for developing and executing our security strategy, governance, and processes. Your role will also aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
community – is seeking to urgently place a Network Security and Support Engineer to protect highly confidential focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures threats Duties: Design, configure, and implement secure network solutions, including firewalls, intrusion software and WiFi issues Develop and enforce network security policies, procedures, and best practices installing g. ISO27001, GDPR) and their impact on network security Solid understanding of network protocols, routing
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure Infrastructure and Operations department to drive the security vision and strategy forward. Role Overview: the Information Security Officer, you will be the linchpin for information security efforts, responsible responsible for developing and executing our security strategy, governance, and processes. Your role will also aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems
Combination of client site and up to up to 50% work from home Travel : 0-25 % Estimated Role Type : Managerial management, Infrastructure management data analysis, security or product development OR equivalent experience Infrastructure Management, stakeholder engagement, security, and analytics or similar Passion for building infrastructure to ensure performance, reliability, and security. Oversee the design, implementation, and maintenance storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure
DEPARTMENT OF INFORMATION TECHNOLOGY SERVICES HIGH-PERFORMANCE COMPUTER (HPC) SYSTEM ADMINISTRATOR PEROMNES PEROMNES POST LEVEL 7 The successful candidate's responsibilities will include, but are not limited to: Apply patches, updates, and security fixes to ensure the stability and security of the system; Troubleshoot as a liaison between research teams and the IT department to address infrastructure-related issues; Application solutions. ADDED ADVANTAGES AND PREFERENCES: Relevant post-graduate qualification; Two years' experience with:
task efficiency. KEY PERFORMNACE AREAS : Ensuring security updates are current across all systems. Running ensure the most secure approach is being employed. Developing systems for specialized security requirements responsive. Studying devices and implementing the best security protocols for everything from cell phones to tablets complementary departments to ensure adherence to security protocols. Monitoring security administrations
regulations and policies related to data privacy, security, and access Managing relationships with IT vendors guides Collaborating with other IT staff and departments to ensure smooth functioning of IT services and
Team and oversee the day-to-day functions of the department. MAIN RESPONSIBILITIES:- Maintenance of hardware requested Arrange and plan equipment moves for departments Assist Tech support on queries and solutions management and knowledge transfer Security Compliance: Enforce security policies and procedures related standards to protect sensitive data and mitigate security risks.