•Design and implement ICT security architecture, as well as appropriate security controls in line with processes, standards, and procedures. •Configure, manage, and document Switch, LAN and WAN infrastructure layer with Encryption and User Authentication. •Management and monitoring of Anti-virus, firewall, cameras certification e.g., CISM or CISSP a must. •Network, Security certification is essential
highly skilled and detail-oriented Information Security Officer with experience in safeguarding organizational information and systems. Expertise in developing, implementing, and managing comprehensive comprehensive security programs to protect against cyber threats.Â
What you’ll do:
The and successful delivery of the companies Cyber Security Strategy.
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Certified Information Security Manager KPAs
Develop and Implement Cybersecurity
seek an experienced Information Security Engineer to implement and monitor security controls to protect
Job Title: Information Security Analyst Location: Cape Town, Western Cape Type: Full-Time Working Hours: world of information and cybersecurity. About the Role: Seeking talented Information Security Analysts Analysts to join Information and Cyber Security team. This critical role ensures the company derives maximum cybersecurity. Reporting to the Senior Manager of Information and Cybersecurity Services, the successful company's security posture through continuous vulnerability assessments; incident handling; and security assessments
Reference: ITE006140-DEP-1 Are you an Information Security Officer looking for your next new challenge known automotive company is looking for an Information Security Officer (ISO) to join their team. The ISO sustaining an all-encompassing security program to protect information assets and technologies. As the all security-related issues, both technical and otherwise, the ISO develops and enacts a security program leadership on security strategies and resource allocation, ensuring proper information security governance
Grahamstown, Eastern Cape for a Senior Lecturer in ICT (Information Communication Technology) within a Higher Requirements: PhD in Education with Information Communication Technology (ICT) Education as specialisation Teaching at the undergraduate and post graduate levels in ICT Education. Teaching experience in any dimension of and PhD levels. Track record of administration, management and/or leadership roles at department and faculty and implement policy aligned and theoretically informed ICT courses across qualification levels Evidence
Grade A Security Risk Management Information Coordinator National Diploma Security Management OR National National Diploma Security Risk Management (NQF level 6) OR other 3-6 years Intelligence collection related investigation activities Will do security audit techniques to identify security weakness. Experience and skill regulations and agreements Experience skill regards to security systems. Knowledge of Criminal and Procedures Intelligence philosophy and methodology. Collect information with standard intelligence practices processes
PSIRA Grade A Security Manager Risk Information Support- Gauteng Formation and Support Bachelor’s Degree Degree in Security Risk Management, Business Management OR B.Tech Degree equivalent OR related field. Must than 6 years management experience within a Security or related environment. Have a Management Development essential Working experience gained in Security Risk Management principles and practices Computer Literacy Microsoft Office Suite (Intermediate). Senior Management Development Programme (SMDP) OR equivalent. advantage
seek an experienced Information Security Engineer to implement and monitor security controls to protect Implement best practices and assist in adherence to security standards for the organization. Support company regarding their impact on information security. Investigate and react to security incidents and ongoing threats threats, ensuring the organization is secure. Monitoring networking environments and responding, engagement performance of IT security measures Monitor, manage, configure, troubleshoot and maintain IT security hardware