“Information Security Officer (JB4444) Remote, (Suitable for candidates in Gauteng Only) R1 000 000.00 sector is looking for a professional Information Security Officer. The business’ core focus is on providing and successful delivery of the companies Cyber Security Strategy The position is a remote position. Candidates advantageous: CISSP: Certified Information Systems Security Professional CISA: Certified Information Systems Information Security Manager KPAs 5 years’ experience in Cyber Security Framework Knowledge of Security best
seeking a highly skilled and experienced Cloud Security Engineer to join our team on a full-time basis responsible for designing, implementing, and maintaining secure cloud environments for our clients. This role requires requires a deep understanding of cloud security best practices and a strong background in cloud infrastructure infrastructure and architecture. 1. Cloud Security Focus Develop and execute the Cloud technology roadmap with cloud and cloud security technologies. Engage with business units to ensure secure Cloud deployments
PSIRA Grade A Security Risk Management Information Coordinator National Diploma Security Management OR OR National Diploma Security Risk Management (NQF level 6) OR other 3-6 years Intelligence collection investigation activities Will do security audit techniques to identify security weakness. Experience and skill regulations and agreements Experience skill regards to security systems. Knowledge of Criminal and Procedures strategy. Reporting of intelligence to Manager: Security Information Access relevant Company systems/databases
PSIRA Grade A Security Manager Risk Information Support- Gauteng Formation and Support Bachelor’s Degree Degree in Security Risk Management, Business Management OR B.Tech Degree equivalent OR related field. Must more than 6 years management experience within a Security or related environment. Have a Management Development Certificate essential Working experience gained in Security Risk Management principles and practices Computer and timeous intelligence to support the overall Security and Company objectives Design Implement appropriate
training and change management to ensure smooth transition into production ● Compile release notes of change
Monitors online security for users and networks and takes appropriate steps to address security breaches if emergency plans to address equipment, power, or security failure to ensure preservation of technology and
vault arrears. Maintain and update SQL databases. Transition clients to debit orders or vault collections
month, CTC Permanent Our client is currently transitioning to a PowerBI reporting ecosystem and is seeking
high volume multi-user access environments, web security best practices & accounting systems. In addition SQL / non-SQL and AWS space. Keeping an eye on security updates, server environments and issues found and updates necessary for keeping up with modern security and development best practices. Requirements: programming paradigms. Ability to write efficient, secure, well-documented, and clean JavaScript code. Optimizing
high volume multi-user access environments, web security best practices & accounting systems. In addition non-SQL and AWS space.
paradigms.