National Diploma in Information Technology or relevant equivalent qualification at NQF level 6 » A minimum
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
drives the implementation of an organisation-wide information security strategy aligned with the client's business Contributes towards establishing and maintaining information security policies, procedures, standards, and identification, assessment and management of information security risks across the organisation, including standards. Assesses and selects appropriate security technologies and solutions to protect client's digital assets to executive leadership and stakeholders. Stays informed about emerging security threats and industry trends
are currently recruiting for the Intermediate Technology Enterprise Architect and this is a 3 year contract architecture. Obtaining and understanding of how our information and date assets will be leveraged. Determine required. Identify the in place and required technology components. Opportunity identification (bottom-up) be supported by having timeous and relevant information sets on which to act form the basis for a wide policies, and processes. Design Technology Views and Taxonomies. Review Technology Costing and Resource Allocation
INFORMATION SECURITY SPECIALIST (12 MONTHS FIXED-TERM CONTRACT) The purpose of the job is to plan, manage guidelines and processes to ensure compliance. As an Information Security Specialist, you will be responsible security mechanisms that protect the network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies
and relational databases, Willing to learn AWS technologies: network security groups, cross-account communication
that provides sustainable resource, process or technology solutions to address a wide range of challenges to interact with the business community at all levels, from facilitating design workshops and conducting organisation's strategy, processes, information and information technology assets. The BA will link and align and processes of an organisation to its information technology strategy. The candidate documents this adaptable manner. Bring business needs, capabilities, technology and processes together efficiently and effectively
Vehicle Flash Coordinator (Entry) - Rosslyn Amazing brand with cutting edge technology Excellent teams in Global component, HVB and vehicle flashing areas. Provide 1st level support to the component, HVB and complete vehicle flashing areas. Troubleshoot and solve critical technology issues in a timely manner and implement effective and quick to learn other systems. Understand some level of programming and willing to learn other inhouse
Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders founders created to provide IT Services, Digital Technologies, Strategic Workforce, and Outsourcing in an effective us a strong ecosystem to leap to the next growth level and turn the ecosystem upside to find stalwarts To participate in the definition of the higher-level functional and non-functional requirements, analyse them, safeguarding the strategic alignment of technology architecture with the agreed business outcomes
influence and broker conversation with executive level stakeholders to address cyber risk in a financial and maintaining target Cyber Security Maturity levels Building relevant Business Cases for key initiatives Degree or relevant tertiary qualification in Information Technology A minimum of 8 years of experience in a risk, controls, and compliance management in a technology environment At least 8 years of experience in management in a cyber or technology environment Knowledge of common information technology management and compliance