Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
ensuring local procedures and activities comply with all regulatory requirements and internal policies, procedures
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management strategic, comprehensive enterprise information security and IT risk management program to ensure that regional IT Team to ensure that IT security measures are built into all internal, interfaced and 3rd party
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements:
Are you an experienced and dynamic security professional looking to make a significant impact in the largest and most prestigious banks is seeking a Lead Security Engineer to join our team in Sandton. This pivotal increasingly complex threat landscape. As the Lead Security Engineer, you will be at the forefront of our design, implementation, and management of advanced security solutions. You will collaborate with a diverse (Information Technology Infrastructure Library) Security Domain-related certifications preferable. 10 years
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and
focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures trong>
community – is seeking to urgently place a Network Security and Support Engineer to protect highly confidential focus on network security, be instrumental in designing, implementing, and integrating secure network infrastructures threats Duties: Design, configure, and implement secure network solutions, including firewalls, intrusion software and WiFi issues Develop and enforce network security policies, procedures, and best practices installing g. ISO27001, GDPR) and their impact on network security Solid understanding of network protocols, routing
Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, implementations, monitor & evaluate all technical delivery from the team, strengthen and advises advises customers and the Engineering team on the security systems' maturity and resilience posture for protecting Objectives: Serve as the primary point of contact for all security incidents, working with various teams to resolve timely and efficient manner. Investigate potential security breaches, conducting root cause analysis and developing
skilled and detail-oriented Information Security Officer with experience in safeguarding developing, implementing, and managing comprehensive security programs to protect against cyber threats.Â
What and successful delivery of the companies Cyber Security Strategy.
conventions to ensure the accuracy and completeness of all data master files Performing the operational establishment of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering debugging, tracking, reproduction, logging and resolving all identified problems, according to approved quality associated with system security and disaster recovery planning Liaising with security vendors, suppliers recommending, installing and maintaining software security applications; and monitoring contractual obligations