The incumbent will be responsible for leading Transitions anywhere from across our global footprint. The
knowledge of Transitions
- The incumbent will be responsible in ensuring that the Transitions are successful
Transitions, the incumbent will also be responsible for building capability of the Transitions function
leadership to the table that improves Transitions set up and implementation
- The incumbent
incumbent is
expected to take over the Transitions of a specific client engagement as the Lead when
reach their full potential. About the Role: The Transitions Assistant Vice President role is pivotal in driving
African businesses, is actively seeking Senior Transitions Managers to join their team. This role presents for individuals with extensive experience in transitions and a passion for driving successful outcomes outcomes. Key Responsibilities: Lead transitions across the global footprint, leveraging in-depth knowledge and expertise in transition management. Ensure the seamless execution of transitions while also focusing capability of the transitions function. Provide thought leadership to enhance transitions setup and implementation
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop
similar role, with a proven track record in cloud security
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
is currently looking for a Cyber Safety & Security Engineer within the Digital Technology Department to identify security control and/or capability gaps that impacts the organization's security posture Provide reviews and actively lead the discussions from a security standpoint Create formal written documentation patches for discovered vulnerabilities; assist security, server management, desktop, private/public cloud when necessary. Expand the use of automation in securing the environment and across multiple technology