mechanisms that protect the company's network and information systems against breaches, viruses, and Antispyware;
resources;
- Develop and implement standardised Information Security processes and procedures;
- Respond
managed and configured properly;
- Ensure Information System compliance and conformance to IT policies
assessments;
- Research, plan, and implement information security technical solutions to meet business
Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
mechanisms that protect the business' network and information systems against breaches, viruses, and Antispyware resources. •Develop and implement standardised Information Security processes and procedures. •Respond to policy management. •National Diploma in Information Technology or relevant equivalent qualification at
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
analysis. ✓ Bachelor's degree in Computer Science, Information Systems, or a related field. ✓ Proven experience
Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite drives the implementation of an organisation-wide information security strategy aligned with the business objectives Contributes towards establishing and maintaining information security policies, procedures, standards, and identification, assessment and management of information security risks across the organisation, including standards. Assesses and selects appropriate security technologies and solutions to protect digital assets. Implements
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and all technology projects, systems, and services •Provide leadership to the enterprise's information security overall business technology planning, providing current knowledge and future vision of technology and systems or possible breaches of electronic data and information systems, as well as their origins; coordinate
looking for a Chief Information Officer / CIO to be responsible for the technology infrastructure, systems to take responsibility for the company's information technology, computer systems with duties including Science, Information Technology or a related field Minimum of 10 years working in a technological / technical presentation skills Responsibilities: Ensuring that technological resources meet the company's short and long-term establish IT-related projects Monitor changes in the technology sector to discover ways the company can improve
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to in-depth analysis with stakeholders on complex information security issues and provide optimum solutions technical requirements while aligning with the information security strategy. To support the Wealth cluster Computer Science / Informatics
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
Partner with stakeholders across about security software and best practices for information security.