/>Certified Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager
Manager.
CISA Certified Information Systems Auditor - preferable.
CDPSE Certified Data Privacy
/>Experience in:
Implementation and managing information security solutions in the following environments:
Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be ensuring the security of the organisation's information, data, and systems, and will play a key role implement information security policies and procedures to safeguard company data and information systems company staff to promote best practices for information security. Collaborate with IT and other departments
Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report infrastructure of IT systems · Respond to all information security incidents; · Serve as a point of contact
Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report infrastructure of IT systems · Respond to all information security incidents; · Serve as a point of contact
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and services •Provide leadership to the enterprise's information security organisation •Partner with business to raise awareness of risk management concerns •Assist with the overall business technology planning, or possible breaches of electronic data and information systems, as well as their origins; coordinate
industrial company is urgently looking for a Chief Information Officer / CIO to be responsible for the technology be to take responsibility for the company's information technology, computer systems with duties including following is required: Degree in Computer Science, Information Technology or a related field Minimum of 10 years to email your CV to nicolelbedifferent.co.za Information displayed above not limited to advertisement advertisement. Please contact for further information. Please consider your application as unsuccessful if you have
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to in-depth analysis with stakeholders on complex information security issues and provide optimum solutions technical requirements while aligning with the information security strategy. To support the Wealth cluster Computer Science / Informatics
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
journey. Use stakeholders' and user feedback to inform necessary improvements and adjustments to technology protect sensitive internal and external client information Evaluating and implementing new systems and infrastructures