Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite drives the implementation of an organisation-wide information security strategy aligned with the business objectives Contributes towards establishing and maintaining information security policies, procedures, standards, and identification, assessment and management of information security risks across the organisation, including standards. Assesses and selects appropriate security technologies and solutions to protect digital assets. Implements
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
experience required.
This is short term contract for 4 months
are currently recruiting for the Intermediate Technology Enterprise Architect and this is a 3 year contract architecture. Obtaining and understanding of how our information and date assets will be leveraged. Determine required. Identify the in place and required technology components. Opportunity identification (bottom-up) be supported by having timeous and relevant information sets on which to act form the basis for a wide policies, and processes. Design Technology Views and Taxonomies. Review Technology Costing and Resource Allocation
Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite drives the implementation of an organisation-wide information security strategy aligned with the business objectives
Solution's client is looking for a Systems Engineer - Information Security for one of their clients based in Johannesburg Senior Systems Engineer, Information Security in developing and managing information security programs related overall integrity and protection of business information security and ICT assets and is also primarily effective analytical capability in support of the Information Security Team objectives. Qualifications and Proactively monitors, investigates and reports on information security incidents, Internet use and ICT policy
your career with us Essential Requirements: 2 to 4 years of experience in Software Development Basic and relational databases, Willing to learn AWS technologies: network security groups, cross-account communication
to employees with technical problems and information technology issues involving desktop, laptop or network Service Management, has experience with various technologies, and possesses excellent computer, oral, and Computer Science or a related field required
Roles and Responsibilities:
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The