Reference: CAW005261-RN-2 12-Month Automotive Learnership Opportunity - Pinetown, KwaZulu-Natal Are you you interested in a 12-Month Automotive Learnership focused on Vehicle Sales? The successful candidate All training will be provided in this 12-month learnership programme. Requirements: Grade 12 Tertiary Qualification
protection of data, resources and systems. The Information Security Specialist will be required to execute protection. Developing and executing standardized Information Security processes and procedures. Timely response management. Responsible for guarantee compliance of Information Systems with IT policies and processes. Adhering measures. Researching, planning and executing information security solutions to meet business needs. Proactively governance and security National Diploma in Information Technology or relevant equivalent qualification ITIL
01 MAY 2024 SPECIALIST: REMUNERATION AND HR INFORMATION MANAGEMENT Reporting line : Head: Remuneration and information services on a national basis throughout the organisation as well as information management HR SAP modules and other related systems for information management for decision making. Prepare qualitative enabling Share information with Executives when requested to enable understanding of HR information Prepare narratives based on qualitative and quantitative information for strategic various Stakeholders Development
purpose of an Information Security Analyst role is to safeguard the organisation's information systems and protect our systems, networks and data. The Information Security Analyst contributes to maintaining compliance confidentiality, integrity, and availability of information. KEY PERFORMANCE AREAS (KPAS) KPA 1 Security Identify and develop improvement plans related to information security. 2.2. Coordinate the execution of improvement resources for new and emerging cyber threats and technologies. 5.1. Stay current with emerging threats and
purpose of an Information Security Analyst role is to safeguard the organisation's information systems and protect our systems, networks and data. The Information Security Analyst contributes to maintaining compliance confidentiality, integrity, and availability of information. KEY PERFORMANCE AREAS (KPAS) KPA 1 Security Identify and develop improvement plans related to information security. 2.2. Coordinate the execution of improvement resources for new and emerging cyber threats and technologies. 5.1. Stay current with emerging threats and
a division of Datacentrix is looking for an Information Security Specialist for one of their client based National Diploma in Information Technology or relevant equivalent qualification at NQF level 6 A minimum mechanisms that protect the CMS network and information systems against breaches, viruses, and Antispyware resources Develop and implement standardised Information Security processes and procedures Respond to always managed and configured properly Ensure Information System compliance and conformance to IT policies
a division of Datacentrix is looking for an Information Security Specialist for one of their client based National Diploma in Information Technology or relevant equivalent qualification at NQF level 6 A minimum mechanisms that protect the CMS network and information systems against breaches, viruses, and Antispyware resources Develop and implement standardised Information Security processes and procedures Respond to always managed and configured properly Ensure Information System compliance and conformance to IT policies
a highly-motivated and experienced Business Information Analyst to join their team. This is a role geared geared towards creating Business Information metrics and dashboards. The candidate will be involved in
mechanisms that protect the organizations network and information systems against breaches, viruses, and Antis resources
Roles and Responsibilities:
- Design, install, and maintain security measures against breaches, viruses, and spyware.
- Upgrade systems with security controls.
- Define access privileges and control structures.
- Establish standardized security processes.
- Ensure proper con