both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report and keep abreast of the latest cybersecurity technologies; · Manage IT security operations; · Develop
modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report and keep abreast of the latest cybersecurity technologies; · Manage IT security operations; · Develop
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and all technology projects, systems, and services •Provide leadership to the enterprise's information security overall business technology planning, providing current knowledge and future vision of technology and systems or possible breaches of electronic data and information systems, as well as their origins; coordinate
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to in-depth analysis with stakeholders on complex information security issues and provide optimum solutions technical requirements while aligning with the information security strategy. To support the Wealth cluster Computer Science / Informatics
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
Partner with stakeholders across about security software and best practices for information security.
An international company, specializing in IT services is looking for a somewhat experienced Technician who can start ASAP, to join their Midrand team. Based on performance after 1 year, the contract may be made permanent. Fixing PCs and Printers. Face-to-face visits with clients (must be presentable
problem-solving skills. Attention to detail. Internship, Development, Graduate, SDLC
proud to announce that we still have an ongoing internship program. Join the Future of Quality Assurance: Assurance: iLAB Software Quality Assurance Internship 2024/2025 Are you a recent graduate eager to leap into expert, then the iLAB Software Quality Assurance Internship is your gateway to success Why iLAB? At iLAB just shaping the future – we're creating it. Our internship programme is designed to nurture and challenge