mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
a WIL/In-Service training/Industrial Exposure internship programme
must not be participating on another learnership or internship program;
Our client is looking for technology/ domain specialist II candidate must actively own and be accountable accountable for the overall evaluation of multiple Technology or Domain assets while influencing and maintaining
/>Job Requirements:
strategies to drive web leads. Job Requirements: NQF Level 6 (360 credits - 8 level framework) in Marketing management (minimum 4 years) Understanding of web technologies (.Net, AJAX, CMS, Flash) SEO certification and
requires access to which information & Plan, coordinate, and implement information security programs. Help various technologies and ways to manage them Good working knowledge of various security technologies such of established company Relevant knowledge of information security management and policies Sound understanding and network technologies Relevant knowledge of technological advances within the information security arena business needs to technology solutions Ability to discuss and report technology and information security risk
DegreeRelevant tertiary qualification in Information technology and Minimum of 8 years of experience in risk, controls, and compliance management in a technology environment 8 years' of experience in IT Audit management in a Cyber or technology environment Knowledge of common information technology management / compliance requirements, such as Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data architecture; internet protocols; firewalls; VPN technologies, IDS/IPS, network access control and network
that provides sustainable resource, process or technology solutions to address a wide range of challenges organisation's strategy, processes, information and information technology assets. The BA will link and align and processes of an organisation to its information technology strategy. The candidate documents this adaptable manner. Bring business needs, capabilities, technology and processes together efficiently and effectively Perform business analysis tasks to connect information technology; processes and business needs in varying
Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders founders created to provide IT Services, Digital Technologies, Strategic Workforce, and Outsourcing in an effective them, safeguarding the strategic alignment of technology architecture with the agreed business outcomes Experience in designing innovative solutions within technology businesses such as Authentication Systems, System Business Architecture, Information Architecture, Application Architecture or Technology Architecture with