Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
Good understanding of networking and network security is a must; knowledge of cryptographic principles
/>- Good understanding of networking and network security
- Systematic and analytical approach to problem
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
Information Security Officer , Manager and / or Consultant . Security CEH Experience in Cyber Security Architecture PAM. Technical security design and integration. Comprehensive background of cloud security architecture understanding of IT Infrastructure Good understanding of Security (FW, IPS, EPS) Good understanding of Microsoft Infrastructure Security – Firewalls, IPS, Endpoint Security, email, and application security. Qualifications: Qualifications: 5 years' relevant Information Security experience, at a technical level. Relevant Qualification
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
delivering cutting-edge hardware and software-based security solutions in the ICT industry, is looking for They pride themselves on developing secure networking encryptors, secure mobile communications, and cryptographic Develop and maintain software applications for secure networking encryptors, mobile communications, and trusted operating system, ensuring its integrity and security. Collaborate with a diverse team to design custom Strong understanding of networking and network security. Systematic and analytical approach to problem-solving
provide a mitigating methodology to ensure data security. Your key responsibilities will include, but is recommendations for enhancing IT controls and security measures, aligning with organizational goals and stakeholders. Data Security Assessment and Enhancement: Assess the effectiveness of data security measures comprehensively classification. Provide achievable recommendations to secure data security strength and mitigate potential vulnerabilities process. Minimum 3 years managing a team. Cyber security experience Financial Services experience Kindly
devices, such as switches and firewalls, to maintain secure and efficient connectivity.