mechanisms that protect the company's network and information systems against breaches, viruses, and Antispyware;
resources;
- Develop and implement standardised Information Security processes and procedures;
- Respond
managed and configured properly;
- Ensure Information System compliance and conformance to IT policies
assessments;
- Research, plan, and implement information security technical solutions to meet business
Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
analysis. ✓ Bachelor's degree in Computer Science, Information Systems, or a related field. ✓ Proven experience
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and all technology projects, systems, and services •Provide leadership to the enterprise's information security overall business technology planning, providing current knowledge and future vision of technology and systems or possible breaches of electronic data and information systems, as well as their origins; coordinate
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
Partner with stakeholders across about security software and best practices for information security.
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
An international company, specializing in IT services is looking for a somewhat experienced Technician who can start ASAP, to join their Midrand team. Based on performance after 1 year, the contract may be made permanent. Fixing PCs and Printers. Face-to-face visits with clients (must be presentable
problem-solving skills. Attention to detail. Internship, Development, Graduate, SDLC
proud to announce that we still have an ongoing internship program. Join the Future of Quality Assurance: Assurance: iLAB Software Quality Assurance Internship 2024/2025 Are you a recent graduate eager to leap into expert, then the iLAB Software Quality Assurance Internship is your gateway to success Why iLAB? At iLAB just shaping the future – we're creating it. Our internship programme is designed to nurture and challenge