Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
/>Job Title: Information Security Manager (ISM)
Job Type: Permanent
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
Information Security, providing an advisory services role and acting as the focal point for security compliance-related
Responsibilities:
Duties & Responsibilities: •Promote and manage IT security and privacy awareness training and education teachers, and staff, as well as create proper security incident notification protocols. •Promotes the and management. •Coordinates technical operations within the IT organisation to develop and manage the the IT security infrastructure, as well as providing management with frequent status and service-level comprehensive enterprise information security and IT risk management program to ensure that information
Hypercheck is seeking a Group Security Manager to oversees and coordinates security operations within an organization information. The Group Security Manager will manage all operational aspects of the security department. This This includes management of service providers for guarding and security equipment as well as training on employees. The manager takes responsibility for shrinkage and loss of company assets, managing security risks level while managing costs to budget. Key Responsibilities: Develop and implement security policies,
Reference: Pta003326-EP-2 We require a Software Developer who will be responsible for the software and processes related to ERP and MRP systems at an electronic engineering manufacturing company. The company prides itself on offering high-quality products and exceptional service to customers In the
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This is at the heart of our security operations, offering the chance to shape security architecture, deploy with clear data driven results for use during security assessments, incident analysis and root cause Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes. Monitor networks and connected devices for security issues. Proactively respond to and report on DLP
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Account Management infrastructure and processes. What will you be responsible for? On a day-to-day basis