to enter into a 12-month contract. The post HR Internship appeared first on freerecruit.co.za .
in the HR solutions field.Â
The Chief Technology Officer (CTO) will provide sound technical leadership vision and leading all aspects of the Group’s technology development. The position will include overseeing overseeing all technical aspects and technological resources of our organisation for the purpose of organisational establishing a technological vision for an organisation and leads the company's technological development stakeholders and customers to ensure our company’s technologies are developed and used appropriately.
mechanisms that protect the company's network and information systems against breaches, viruses, and Antispyware;
resources;
- Develop and implement standardised Information Security processes and procedures;
- Respond
managed and configured properly;
- Ensure Information System compliance and conformance to IT policies
assessments;
- Research, plan, and implement information security technical solutions to meet business
Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
analysis. ✓ Bachelor's degree in Computer Science, Information Systems, or a related field. ✓ Proven experience
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and all technology projects, systems, and services •Provide leadership to the enterprise's information security overall business technology planning, providing current knowledge and future vision of technology and systems or possible breaches of electronic data and information systems, as well as their origins; coordinate
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
Partner with stakeholders across about security software and best practices for information security.
modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report and keep abreast of the latest cybersecurity technologies; · Manage IT security operations; · Develop