Are you a people's person with a PhD and a passion for decolonizing research? Join us to help make change happen The University of Johannesburg Methods Lab is looking for a Post Doctoral Fellow to do research, writing, networking and broadcasting, etc. E-mail your CV to kevinduj.ac.za
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's Infrastructure the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's Infrastructure the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
advantageous:
CISSP: Certified Information Systems Security Professional
CISA: Certified Information Certified Information Security Manager KPAs
Develop and Implement Cybersecurity
Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 is looking for a professional Information Security Officer. The business' core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates will however need to be able to commute to Head Office as and when required. Minimum Requirements: Matric advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems
The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and sustainable development, and strategic partnerships, UJ is an international university of choice. The University guided by the Vice-Chancellor's vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal Proven advanced experience with full Microsoft Office applications (including Excel, Word, and SharePoint) procedures. Management of administrative elements in an office. Exceptional verbal and written communication skills
monitor, and remediate ICT security issues.
skillset within the security space. PLEASE TAKE NOTE THAT IF YOU DO NOT HAVE SECURITY GUARD EXPERIENCE OR OR ARMED RESPONSE OFFICER EXPERIENCE AND DONT HAVE THE RELEVANT PAPERWORK, YOUR CV WILL BE REJECTED IMMEDIATELY reflexes to respond effectively to security threats or emergencies. Security Skills: Proficiency in risk assessment assessment, threat analysis, and security protocols. Familiarity with surveillance techniques, access effectively as part of a team and collaborate with other security personnel, and clients Willingness to follow instructions
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Financial Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing and responding to security incidents Responsible for assessing and securing the digital infrastructure effective counter measures. : Implement and manage security technologies and controls, including firewalls detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions