and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document
Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management strategic, comprehensive enterprise information security and IT risk management program to ensure that Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced
Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, advises customers and the Engineering team on the security systems' maturity and resilience posture for protecting Serve as the primary point of contact for all security incidents, working with various teams to resolve timely and efficient manner. Investigate potential security breaches, conducting root cause analysis and developing prevent future incidents. Implement and maintain security controls in accordance with industry best practices
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations
Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 sector is looking for a professional Information Security Officer. The business' core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems Information Security Manager KPAs 5 years' experience in Cyber Security Framework Knowledge of Security best
“Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 sector is looking for a professional Information Security Officer. The business’ core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems Information Security Manager KPAs 5 years’ experience in Cyber Security Framework Knowledge of Security best
Your Purpose: Join the team as a Security Engineer within the IT Security Services division, where your In this role, you'll oversee the response to security incidents, conduct thorough investigations, implement professionalism. Understanding and addressing complex security requirements will be a significant part of your your role. Moreover, you'll take ownership of security technology implementations, maintenance, and operations in various security technologies, including network security and Microsoft Azure Security Technologies
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
BET provides reliable, stable, scalable, robust, secure and continually evolving high-volume transaction Implementation – Ensure the Solution has Effective Security; Implementation - Ensure the Solution is Maintainable Elevate Your Skills: Unlock access to conferences, learnerships, bursaries, Star Lab and Graduate Programmes