plan, manage, and administer the client's network security. Ensure all network components are managed in ensure compliance. Design, install and manage security mechanisms that protect the clients's network Upgrade systems by implementing and maintaining security controls; Protect the system by defining access Develop and implement standardised Information Security processes and procedures; Respond to internal to ensure compliance and correction of all IT security issues; • Conduct IT risk assessments; Assist
IT Compliance and Security Specialist (JB4361) Sandton, Gauteng R40 000 to R45 000 a month CTC Permanent IT Compliance and Security Specialist to join their Team. Their products cover coin and banknote counting electronic drop safes for retail establishments, coin sorting and sachet equipment used by CIT companies IT Risk Assessments, networks, servers, cyber security, and general end user support. Candidate must must have knowledge of I.T. Operations, security, governance, frameworks, and a firm grasp of the below to
highly skilled Cyber Security Principal Lead/Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
& Plan, coordinate, and implement information security programs. Help protect against Web threats that hardware as relating to Cyber, Understanding of AWS security. Excellent IT skills, including knowledge of computer systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls knowledge of information security management and policies Sound understanding of security operational processes
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document
& Plan, coordinate, and implement information security programs.
Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management strategic, comprehensive enterprise information security and IT risk management program to ensure that Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced
Junior PSIRA B Mine Security Risk Information Officer Reporting to the Security Information Coordinator Coordinator Must have a National Certificate Security Risk Management (NQF level 5) or equivalent. Must have working experience in security audit techniques, in order to identify security weakness. Working experience Working experience and skill with regards to security systems. Participate in Information/Intelligence various networks for analysis to support the overall Security Information objectives. Collect information/intelligence
Performing network security tasks, including setting up and monitoring of secure voice system networks OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working