highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Key Responsibilities: Oversee the security of information systems and the company's overall security stance infrastructure of IT systems. Respond promptly to all information security incidents. Develop and sustain controls implement, and monitor a comprehensive enterprise information security and risk management program. Work with
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The demonstrable senior managerial experience in an Information and Communication Technology (ICT) environment
/>Certified Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager
Manager.
CISA Certified Information Systems Auditor - preferable.
CDPSE Certified Data Privacy
/>Experience in:
Implementation and managing information security solutions in the following environments:
Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be ensuring the security of the organisation's information, data, and systems, and will play a key role implement information security policies and procedures to safeguard company data and information systems company staff to promote best practices for information security. Collaborate with IT and other departments
Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report infrastructure of IT systems · Respond to all information security incidents; · Serve as a point of contact
Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report infrastructure of IT systems · Respond to all information security incidents; · Serve as a point of contact
well-established organisation is looking for an Information Technology Audit Specialist. The main purpose
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework negotiable Certified Information Systems Security Professional (CISSP) CISM – Certified Information Security Manager Manager. CISA – Certified Information Systems Auditor - preferable. CDPSE – Certified Data Privacy Solutions years Experience in: Implementation and managing information security solutions in the following environments: ) Oracle EBS Oracle Fusion Cloud Developing information security policies and procedures. Cybersecurity
highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Key Responsibilities: Oversee the security of information systems and the company's overall security stance infrastructure of IT systems. Respond promptly to all information security incidents. Develop and sustain controls implement, and monitor a comprehensive enterprise information security and risk management program. Work with
overall strategy. Drive the implementation of the Information Management strategies, plans and procedures to compliment and support the IT and TCTA strategies. Assist in driving the implementation of the IT functional new developments and best practice in IT and Information management internationally and locally TCTA Strategy stakeholders INFORMATION MANAGEMENT AND PRIVACY Develop, lead, and deliver the information management programme Maintain expert knowledge in public sector information management, privacy, and record management practice