Description Our client is looking for a Control Systems Technician to join their company Minimum Required Qualification
economic fortunes of Africa”. Job Description: The System Specialist is a critical member of the institution's maintenance, and optimization of the institution's systems. This role focuses on Microsoft Azure Cloud services management, and the administration of key Microsoft System Center products to ensure a secure and efficient mitigate vulnerabilities in the institution's systems and applications. Plan and execute vulnerability Microsoft System Center Configuration Manager (SCCM) for software deployment and updates. Manage System Center
highest standards of information security. We are seeking a dedicated Information Security Officer to Overview: As the Information Security Officer, you will be the linchpin for information security efforts Responsibilities: Oversee the security of information systems and the company's overall security stance and guidance on security policies. Audit current systems and implement new security standards, frameworks latest IT security innovations and cybersecurity technologies. Manage IT security operations and deploy a
/>Certified Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager
Manager.
CISA Certified Information Systems Auditor - preferable.
CDPSE Certified Data Privacy
Essentials Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable
/>Experience in:
Implementation and managing information security solutions in the following environments:
Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be the security of the organisation's information, data, and systems, and will play a key role in developing implement information security policies and procedures to safeguard company data and information systems. Conduct security tools and technologies, including firewalls, intrusion detection systems, and antivirus software
Australian markets with a focus on Cloud Enablement, System Integration, Software Development, Web and Mobile modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS and Microsoft Azure 2. Software and System development 3. System integration, Data integration and migration Analytics 6. Workflow and Robotics Process Automaton 7. System Analysis and Business Analysis 8. DevOps 9. Automation Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join
Australian markets with a focus on Cloud Enablement, System Integration, Software Development, Web and Mobile modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS and Microsoft Azure 2. Software and System development 3. System integration, Data integration and migration Analytics 6. Workflow and Robotics Process Automaton 7. System Analysis and Business Analysis 8. DevOps 9. Automation Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join
/>
Australian markets with a focus on Cloud Enablement, System Integration, Software Development, Web and Mobile modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS and Microsoft Azure 2. Software and System development 3. System integration, Data integration and migration Analytics 6. Workflow and Robotics Process Automaton 7. System Analysis and Business Analysis 8. DevOps 9. Automation tests to identify vulnerabilities in computer systems, networks, and applications. Develop custom testing
Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
Partner with stakeholders across business about security software and best practices for information security.