currently recruiting for a 12-Month Fixed Term Learnership Programme , based in Gauteng (for the following Employment Equity targets. PROGRAMME INFORMATION The Santam Learnership Programme is an entry-level transformation while on the learnership. Applicants must not have been on a Short -Term Insurance Learnership through INSETA
Duties and responsibilities
role with top tier Financial Services company - Oracle PL/SQL & Compass Purpose of role: To develop role with top tier Financial Services company - Oracle PL/SQL & Compass Purpose of role: To develop beneficial Applicable Oracle courses - would be an advantage Must have a minimum of 3 years Oracle PL/SQL experience experience Must have a minimum of 3 years Product (Oracle) specific experience Must have PL/SQL experience architectural standards correctly, as well as any technologies in use Perform code review to ensure logical
in the HR solutions field.Â
The Chief Technology Officer (CTO) will provide sound technical leadership vision and leading all aspects of the Group’s technology development. The position will include overseeing overseeing all technical aspects and technological resources of our organisation for the purpose of organisational establishing a technological vision for an organisation and leads the company's technological development stakeholders and customers to ensure our company’s technologies are developed and used appropriately.
highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Key Responsibilities: Oversee the security of information systems and the company's overall security stance latest IT security innovations and cybersecurity technologies. Manage IT security operations and deploy a cybersecurity model. Deploy and manage IT Security technologies and firewall lifecycle. Monitor network security
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
digital and data technologies and vendors, with a focus on Microsoft, AWS and Oracle. We offer the highest Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report and keep abreast of the latest cybersecurity technologies; · Manage IT security operations; · Develop
digital and data technologies and vendors, with a focus on Microsoft, AWS and Oracle. We offer the highest Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report and keep abreast of the latest cybersecurity technologies; · Manage IT security operations; · Develop
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and all technology projects, systems, and services •Provide leadership to the enterprise's information security overall business technology planning, providing current knowledge and future vision of technology and systems or possible breaches of electronic data and information systems, as well as their origins; coordinate