/>
RTB002425-WHN-1 We are recruiting a Chief Technology Officer for Gauteng Area PURPOSE The position will be responsible Implementation Strategic management of the Office of the Chief Technology Officer (OCTO) division in order to ensure regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
Implementation Strategic management of the Office of the Chief Technology Officer (OCTO) division in order to ensure regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
Employer Description
Sage BP
Job Descriptionworld. The primary role of the Data Protection Officer is to ensure that all data subjects (data from bonus. An understanding of modern information security methodologies and standards, especially in a Hybrid
Employer Description
SAGE BP
Job DescriptionProficient user of MS Project or similar software and MS Office applications. A solid grasp of Software Design
If youve worked for companies across various industries, then you probably know how different environments can make or break your enjoyment in any role. Thats why this opportunity is not one to be missed!
A thriving digital tech company in Pretoria is seeking a skilled Senior C# Dev
day administration. • Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. • Maintains the business-as-usual activities Licensing, Reporting, troubleshooting. • Microsoft Office 365 - Teams, SharePoint, Exchange Administration software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication
Protection, and security platform components and tools.