Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be ensuring the security of the organisation's information, data, and systems, and will play a key role implement information security policies and procedures to safeguard company data and information systems security incidents, breaches, and suspicious activity. Manage the implementation and maintenance of security
highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Key Responsibilities: Oversee the security of information systems and the company's overall security stance security innovations and cybersecurity technologies. Manage IT security operations and deploy a robust cloud-centric cloud-centric cybersecurity model. Deploy and manage IT Security technologies and firewall lifecycle. Monitor
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive the work of the Information and Communications Systems (ICS) division. The CIO manages and oversees the the information technology (IT) strategy, policies, and operations within the university. He or she plays operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The administrative goals of the university. Leading and managing the university's IT department, including IT staff
/>Certified Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager
Manager.
CISA Certified Information Systems Auditor - preferable.
CDPSE Certified Data Privacy
/>Experience in:
Implementation and managing information security solutions in the following environments:
Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity
(advantages)
Vulnerability assessment.
Managing the Security Operations Centre (SOC)
DevOps 9. Automation Testing 10. IT Project Management 11. Finance, Risk & Compliance 12. Engineering Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision vision, strategy, governance, management, processes and user education. The role also requires technical security posture of the Client. Purpose : Assist the management team in creating and executing the security strategy
DevOps 9. Automation Testing 10. IT Project Management 11. Finance, Risk & Compliance 12. Engineering Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision vision, strategy, governance, management, processes and user education. The role also requires technical security posture of the Client. Purpose : Assist the management team in creating and executing the security strategy
strategy. Drive the implementation of the Information Management strategies, plans and procedures to compliment developments and best practice in IT and Information management internationally and locally TCTA Strategy Strategy. OPERATIONAL LEADERSHIP AND PROCESS MANAGEMENT Providing leadership regarding all the operations which includes the provision of ICT Project Management. Reviewing, executing, and monitoring of the Providing guidance, expertise, and advice to Management on trends, best practice and applicable policies
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework negotiable Certified Information Systems Security Professional (CISSP) CISM – Certified Information Security Manager Manager. CISA – Certified Information Systems Auditor - preferable. CDPSE – Certified Data Privacy Solutions years Experience in: Implementation and managing information security solutions in the following environments: ) Oracle EBS Oracle Fusion Cloud Developing information security policies and procedures. Cybersecurity
highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Key Responsibilities: Oversee the security of information systems and the company's overall security stance security innovations and cybersecurity technologies. Manage IT security operations and deploy a robust cloud-centric cloud-centric cybersecurity model. Deploy and manage IT Security technologies and firewall lifecycle. Monitor
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive the work of the Information and Communications Systems (ICS) division. The CIO manages and oversees the the information technology (IT) strategy, policies, and operations within the university. He or she plays operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The administrative goals of the university. Leading and managing the university's IT department, including IT staff