: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Certified Information Security Manager KPAs
Develop and Implement Cybersecurity
Our client invites graduates to share in a journey aimed at producing future leaders through its exciting exciting Graduate Programme. The Graduate Programme which strives to develop excelling individuals through Qualifications: National Diploma, Bachelor’s Degree, Post Graduate Degree. WHAT WE LOOK FOR Individuals who are agile Stipend: R10 000 per month The post Graduate Trainee Information Technology – Johannesburg appeared first
Reference: ITE006140-DEP-1 Are you an Information Security Officer looking for your next new challenge known automotive company is looking for an Information Security Officer (ISO) to join their team. The ISO sustaining an all-encompassing security program to protect information assets and technologies. As the all security-related issues, both technical and otherwise, the ISO develops and enacts a security program leadership on security strategies and resource allocation, ensuring proper information security governance
PSIRA Grade A Security Risk Management Information Coordinator National Diploma Security Management OR OR National Diploma Security Risk Management (NQF level 6) OR other 3-6 years Intelligence collection investigation activities Will do security audit techniques to identify security weakness. Experience and skill regulations and agreements Experience skill regards to security systems. Knowledge of Criminal and Procedures Intelligence philosophy and methodology. Collect information with standard intelligence practices processes
PSIRA Grade A Security Manager Risk Information Support- Gauteng Formation and Support Bachelor’s Degree Degree in Security Risk Management, Business Management OR B.Tech Degree equivalent OR related field. Must more than 6 years management experience within a Security or related environment. Have a Management Development Certificate essential Working experience gained in Security Risk Management principles and practices Computer strategic and operational threats and vulnerabilities. Inform decision-making on business plans Good industry
objectives, are in place
The CIO will oversee the use of Information technology (IT) in our company. You will be the accuracy, security, and legal and regulatory compliance.
Ensure compliance with Cyber Security best
Analyse the costs, value and risks of information technology to advise management and suggest actions
operations. The CIO will oversee the use of Information technology (IT) in our company. You will be the accuracy, security, and legal and regulatory compliance. Ensure compliance with Cyber Security best practices advantage. Analyse the costs, value and risks of information technology to advise management and suggest actions
Reference: ITE006087-DEP-1 Are you a Sage X3 expert looking for a new challenge? A well established wealth management company is looking for an ERP consultant to manage and implement their Sage X3 and Sage 300 platform. They will be responsible for the project management, implementation and configur
accuracy, security, and legal and regulatory compliance Ensure compliance with Cyber Security best practices advantage Analyse the costs, value, and risks of information technology Matric BSc Degree: Computer Science