Computer Science, Information Technology, Cyber security or related field
SECURITY SOFTWARE DEVELOPER
Pretoria East
Minimum Req
communications security and cryptography.
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
/>
client based in Pretoria is looking for an IT Officer with experience in ICT Coordination and Management This is a 12 months fixed term contract. The IT Officer will be required to maintain the IT systems, hardware ICT/IM policy and informing the communications officer of any violations Managing the IT Network internet per request Working with Communication Liaison Officer and Registrar to plan program code enhancements
Role • The primary role of the Data Protection Officer is to ensure that all data subjects (data from bonus. • An understanding of modern information security methodologies and standards, especially in a Hybrid
/>
RTB002425-WHN-1 We are recruiting a Chief Technology Officer for Gauteng Area PURPOSE The position will be responsible Implementation Strategic management of the Office of the Chief Technology Officer (OCTO) division in order to ensure regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an