Key Responsibilities:
Cyber Security Specialist required on a Fixed Term Contract in Midrand lending sector. A Deep understanding of cyber security practices and trends as well as leadership skills maintaining an effective and comprehensive cyber security program.
Requirements: and Minimum of 8 + years of experience in Cyber Security role where you meet business deliverables.
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
highly skilled Senior Cyber Security Specialist to oversee their cyber security strategies and initiatives candidate should have a deep understanding of cyber security practices and trends and possess the leadership maintaining an effective and comprehensive cyber security programme. The principal lead/specialist must proactive approach to ongoing evaluation of cyber security policies to ensure adherence Supporting and assisting 3-to-5-year Cyber Security Strategy Achieving and maintaining target Cyber Security Maturity levels Building
Specialist, you will be responsible for leading complex security assessments and penetration testing projects to Client functions and partners both nationally and internationally. Key Objectives BUSINESS DEVELOPMENT Build stakeholders. Stay up-to-date with the latest security threats, techniques, and countermeasures. Conduct and finalise all own reported findings/reporting points. Review own working papers for quality and completeness (relevant or in a similar role) 4-6 years related IT security experience and a minimum of 4 years in penetration
IT Network Security sustainability Creation and maintenance of the enterprise's security architecture architecture design and all security and network projects Enforce policies, procedures and associated plans for system security. Design and implement disaster recovery plans and assess a need for any security reconfigurations acquire additional security solutions, Recommend, schedule, and perform security improvements, upgrades upgrades. Deploy, manage and maintain all security systems i.e firewalls, anti-virus software, intrusion detection
advantageous:
CISSP: Certified Information Systems Security Professional
CISA: Certified Information Certified Information Security Manager KPAs
Develop and Implement Cybersecurity
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to analysis with stakeholders on complex information security issues and provide optimum solutions which meet requirements while aligning with the information security strategy. To support the Wealth cluster in the cyber security program, policies, standards, reporting of all cluster-specific cyber security program and regulatory matters as it relates to cyber security.
Requirements: