Johannesburg area. BEng Computer Engineering, BEng Industrial Engineering, BSc Computer Science, BSc Information
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed ground up by a talented group of engineers and computer scientists. With a diverse development team, our own Unique specially designed operating systems. Computer Engineer Centurion Our Client requires an applicant
(POTCHEFSTROOM CAMPUS) FACULTY OF HUMANITIES VACANCY: COMPUTATIONAL LINGUIST POSITION NUMBER: P002385 APPOINTMENT implementation of computer software Design, development, and implementation of computer software products · Research Conduct research in the field of computational linguistics and natural language processing processing. · A bachelor's degree (NQF Level 7) in Computer Systems or relevant qualification in a related field field. KEY FUNCTIONAL/ TECHNICAL COMPETENCIES: · Computer literacy and the ability to easily master new
(POTCHEFSTROOM CAMPUS) FACULTY OF HUMANITIES VACANCY: COMPUTATIONAL LINGUIST POSITION NUMBER: P002385 APPOINTMENT implementation of computer software Design, development, and implementation of computer software products · Research Conduct research in the field of computational linguistics and natural language processing processing. · A bachelor's degree (NQF Level 7) in Computer Systems or relevant qualification in a related field field. KEY FUNCTIONAL/ TECHNICAL COMPETENCIES: · Computer literacy and the ability to easily master new
Introduction Position Overview: As a Security Director, you will play a critical role in safeguarding lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your and Implementation: Develop, review, and update security policies, protocols, and guidelines. Ensure consistent emerging threats. Personnel Management: Supervise security staff, including hiring, training, and performance teamwork. Allocate resources effectively to meet security needs. Risk Assessment and Mitigation: Conduct
Description Our client is seeking a Security Director to join their team, based in East London or Johannesburg lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your Requirements:- Bachelors Degree in Criminal Justice, Security Management, or a related field (Masters preferred) CISSP) are advantageous Proven experience in security management, preferably in a corporate or industrial Personnel Management Risk Assessment and Mitigation Security Operations Liaison with External Agencies Background
are seeking a Security Analyst to join our team. As a Security Analyst, you will play consoles
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
Introduction Position Overview: As a Security Director, you will play a critical role in safeguarding lead and manage security operations, policies, and procedures to ensure a safe and secure environment. Your and Implementation: Develop, review, and update security policies, protocols, and guidelines. Ensure consistent emerging threats. Personnel Management: Supervise security staff, including hiring, training, and performance teamwork. Allocate resources effectively to meet security needs. Risk Assessment and Mitigation: Conduct