Reference: JHB000097-KC-1 As a Security Manager, you will be responsible to oversee the safety and protection protection of various mining sites. Implement security protocols, conducting risk assessments, coordinating coordinating with law enforcement, and training staff on security procedures. Key Responsibilities: Maintaining rendering of security service deliver in line with SOP's Ensuring compliance and that all security officers improvement of services General management and supervision of security staff and operations, including
new adventure of being a Client Experience Manager in security services. Your mission? To make sure customers service and handling all the ins and outs of our Security Services Department. Your Responsibilities: Picture a minimum of five years of hands-on experience managing operations and service delivery in complex customer Additionally, you have at least two years of program management experience, specifically in implementing multi-disciplined Whether you've directly managed projects or have had exposure to project management, your insight will be
Reference: JHB000097-KC-1 As a Security Manager, you will be responsible to oversee the safety and protection protection of various mining sites. Implement security protocols, conducting risk assessments, coordinating coordinating with law enforcement, and training staff on security procedures. Key Responsibilities: Maintaining rendering of security service deliver in line with SOP's Ensuring compliance and that all security officers improvement of services General management and supervision of security staff and operations, including
/>Job Title: Information Security Manager (ISM)
Job Type: Permanent
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
Duties & Responsibilities: •Promote and manage IT security and privacy awareness training and education teachers, and staff, as well as create proper security incident notification protocols. •Promotes the and management. •Coordinates technical operations within the IT organisation to develop and manage the the IT security infrastructure, as well as providing management with frequent status and service-level comprehensive enterprise information security and IT risk management program to ensure that information
Firearm Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: PSIRA registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
JHB001871-Chris-1 We are in search of an INFORMATION SECURITY MANAGER (ISM) to lead the technology operations for be to continually develop the organization's IT security strategy to address both current and future business business demands. Successfully complete IT and Cyber Security projects within agreed-upon deadlines, scope, requirements. JOB DESCRIPTION: Job Title: Information Security Manager (ISM) Job Type: Permanent Job Industry: NGO Johannesburg MAIN JOB PURPOSE: The Information Security Officer (ISM) is accountable for ensuring appropriate
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to to security incidents Responsible for assessing and securing the digital infrastructure, identifying effective counter measures. : Implement and manage security technologies and controls, including firewalls (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions. Design, implement
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / protection, and security information and event management (SIEM) solutions Monitor security alerts and logs identify and investigate security incidents and indicators of compromise (IOCs) Security assessments, vulnerability vulnerability scans, and penetration tests to identify security weaknesses and gaps Develop and maintain incident response plans, procedures, and playbooks Implement security best practices and ensure the integrity, confidentiality
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering processes, procedures and operational management associated with system security and disaster recovery planning planning Liaising with security vendors, suppliers, service providers and external resources; analysing, recommending recommending, installing and maintaining software security applications; and monitoring contractual obligations