Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's Infrastructure the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's Infrastructure the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
advantageous:
CISSP: Certified Information Systems Security Professional
CISA: Certified Information Certified Information Security Manager KPAs
Develop and Implement Cybersecurity
Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 is looking for a professional Information Security Officer. The business' core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates will however need to be able to commute to Head Office as and when required. Minimum Requirements: Matric advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems
“Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 is looking for a professional Information Security Officer. The business’ core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates will however need to be able to commute to Head Office as and when required. Minimum Requirements: Matric advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems
monitor, and remediate ICT security issues.
Cyber Security Specialist required on a Fixed Term Contract in Midrand lending sector. A Deep understanding of cyber security practices and trends as well as leadership skills maintaining an effective and comprehensive cyber security program.
Requirements: and Minimum of 8 + years of experience in Cyber Security role where you meet business deliverables.
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR OR ARMED RESPONSE OFFICER EXPERIENCE AND DONT HAVE THE RELEVANT PAPERWORK, YOUR CV WILL BE REJECTED IMMEDIATELY reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to security incidents Responsible for assessing and securing the digital infrastructure effective counter measures. : Implement and manage security technologies and controls, including firewalls detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions