MINIMUM REQUIREMENTS » National Diploma in Information Technology or relevant equivalent qualification at
protection of data, resources and systems. The Information Security Specialist will be required to execute protection. Developing and executing standardized Information Security processes and procedures. Timely response management. Responsible for guarantee compliance of Information Systems with IT policies and processes. Adhering measures. Researching, planning and executing information security solutions to meet business needs. Proactively governance and security National Diploma in Information Technology or relevant equivalent qualification ITIL
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
Our client is looking for technology/ domain specialist II candidate must actively own and be accountable accountable for the overall evaluation of multiple Technology or Domain assets while influencing and maintaining
are currently recruiting for the Intermediate Technology Enterprise Architect and this is a 3 year contract architecture. Obtaining and understanding of how our information and date assets will be leveraged. Determine required. Identify the in place and required technology components. Opportunity identification (bottom-up) be supported by having timeous and relevant information sets on which to act form the basis for a wide policies, and processes. Design Technology Views and Taxonomies. Review Technology Costing and Resource Allocation
INFORMATION SECURITY SPECIALIST (12 MONTHS FIXED-TERM CONTRACT) The purpose of the job is to plan, manage guidelines and processes to ensure compliance. As an Information Security Specialist, you will be responsible security mechanisms that protect the network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies
We are currently recruiting for a Senior Technology Enterprise Architect in Cape Town and this is a 3 architecture. Obtaining and understanding of how our information and date assets will be leveraged. Determine required. Identify the in place and required technology components. Opportunity identification (bottom-up) be supported by having timeous and relevant information sets on which to act form the basis for a wide policies, and processes. Design Technology Views and Taxonomies. Review Technology Costing and Resource Allocation
requires access to which information & Plan, coordinate, and implement information security programs. Help various technologies and ways to manage them Good working knowledge of various security technologies such of established company Relevant knowledge of information security management and policies Sound understanding and network technologies Relevant knowledge of technological advances within the information security arena business needs to technology solutions Ability to discuss and report technology and information security risk
that provides sustainable resource, process or technology solutions to address a wide range of challenges organisation's strategy, processes, information and information technology assets. The BA will link and align and processes of an organisation to its information technology strategy. The candidate documents this adaptable manner. Bring business needs, capabilities, technology and processes together efficiently and effectively Perform business analysis tasks to connect information technology; processes and business needs in varying
Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders founders created to provide IT Services, Digital Technologies, Strategic Workforce, and Outsourcing in an effective them, safeguarding the strategic alignment of technology architecture with the agreed business outcomes Experience in designing innovative solutions within technology businesses such as Authentication Systems, System Business Architecture, Information Architecture, Application Architecture or Technology Architecture with