Cloud Risk, Compliance and Assurance Proven experience managing and operating multiple security programs understanding of Tech Security risks and mitigating solutions A diverse security background with knowledge and spam technologies; risk and vulnerability assessments, and compliance. Security concepts related to
managing risks. Achieve compliance targets and increase customer trust approaching security as a fundamental
Reference: ITE006140-DEP-1 Are you an Information Security Officer looking for your next new challenge? A well known automotive company is looking for an Information Security Officer (ISO) to join their team. The ISO is tasked with creating and sustaining an all-encompassing security program to prot
Reference: JHB001875-Laka-1 PAM Solutions Integrator (Expert) Join our IT Hub South Africa as a PAM Solutions Integrator (Expert). You'll work on global IT solutions, focusing on Privileged Access Management using tools like CyberArk, BeyondTrust, or Thycotic. Ideal candidates have 3-5 years of IT s
Essential Skills Requirements:
- Basic knowledge of ITIL and ITSM such as Problem-Incident-Change Management processes
- Deep knowledge of Confluence, Jira, ability to understand and transfer requirements into User Stories
- Professional communication and documentatio
and prioritize risks that could affect the organization's reputation, financial security, or operations
and prioritize risks that could affect the organization's reputation, financial security, or operations
Reference: BIT003097-Mel-1 A client in the FinTech space is looking for a Chief Information Officer (CIO) to join their ever growing, fast paced team, reporting directly into the CEO. Your main function will be to ensure the use of modern IT software and technologies in order to streamline business
Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems Knowledge across multiple technologies IT Risk and security principes Multiple operating system Systems
across multiple technologies.