standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you will for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
skilled and detail-oriented Information Security Officer with experience in safeguarding developing, implementing, and managing comprehensive security programs to protect against cyber threats.Â
What and successful delivery of the companies Cyber Security Strategy.
Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 is looking for a professional Information Security Officer. The business' core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates will however need to be able to commute to Head Office as and when required. Minimum Requirements: Matric advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you will for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Technician is responsible for monitoring, maintaining, and upgrading the computer systems and networks. Their day-to-day responsibilities will include installing and configuring computer systems, diagnosing hardware and software faults, and solving technical and application problems. Serving as the
Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: PSIRA registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to security incidents Responsible for assessing and securing the digital infrastructure effective counter measures. : Implement and manage security technologies and controls, including firewalls detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / protection, and security information and event management (SIEM) solutions Monitor security alerts and logs identify and investigate security incidents and indicators of compromise (IOCs) Security assessments, vulnerability vulnerability scans, and penetration tests to identify security weaknesses and gaps Develop and maintain incident response plans, procedures, and playbooks Implement security best practices and ensure the integrity, confidentiality
Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: PSIRA registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document