standards of information security. We are seeking a dedicated Information Security Officer to join the drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you will linchpin for information security efforts, responsible for developing and executing our security strategy enhancing the security posture. Key Responsibilities: Oversee the security of information systems and the overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's department. As the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's department. As the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
standards of information security. We are seeking a dedicated Information Security Officer to join the drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you will linchpin for information security efforts, responsible for developing and executing our security strategy enhancing the security posture. Key Responsibilities: Oversee the security of information systems and the overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
/>Certified Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager
Manager.
CISA Certified Information Systems Auditor - preferable.
CDPSE Certified Data Privacy
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
/>Experience in:
Implementation and managing information security solutions in the following environments:
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and implement information security policies and procedures to safeguard company data and information systems
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
Reporting to both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The IT staff, budgets, and resources. Ensuring the security and integrity of the university's IT systems,
well-established organisation is looking for an Information Technology Audit Specialist. The main purpose provide a mitigating methodology to ensure data security. Your key responsibilities will include, but is recommendations for enhancing IT controls and security measures, aligning with organizational goals and stakeholders. Data Security Assessment and Enhancement: Assess the effectiveness of data security measures comprehensively classification. Provide achievable recommendations to secure data security strength and mitigate potential vulnerabilities
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop