Purpose of the Job: The Compliance Officer will report to the Key Accounts Manager. The primary responsibility of the Compliance Officer is to ensure that Security Personnel are in full compliance with standard Company Policies/Procedures/Regulations/Requirements. Further, to ensure our service deli
Description Our client is seeking a Security Director to join their team, based in East London or Johannesburg. Successful candidate will play a critical role in safeguarding the organization, its assets, and personnel. Will be required to lead and manage security operations, policies, and procedure
Description Our client is seeking a Security Director to join their team, based in East London or Johannesburg. Successful candidate will play a critical role in safeguarding the organization, its assets, and personnel. Will be required to lead and manage security operations, policies, and procedure
Xcede My client in the financial industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of
Xcede My client in the financial industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of
Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, implementations, monitor & evaluate all technical delivery from the team, strengthen and advises customers and the Engineering team on the security systems' maturity and resilience posture for p
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework and standards of operations, designing, and enforcing policies & procedures to protect the computing infrastructure from all forms of security breaches, as well as the identification of v
Manage IT security operations and deploy a robust cloud-centric cybersecurity model. Deploy and manage IT Security
Manage IT security operations and deploy a robust cloud-centric cybersecurity model. Deploy and manage IT Security
Management Functions (Including Security and Access Control), • Operational Management Support pertaining to the