currently recruiting for a 12-Month Fixed Term Learnership Programme , based in Centurion (Johannesburg/Tshwane) Employment Equity targets. PROGRAMME INFORMATION The Santam Learnership Programme is an entry-level transformation while on the learnership. Applicants must not have been on a Short -Term Insurance Learnership through INSETA
currently recruiting for a 12-Month Fixed Term Learnership Programme , based in Gauteng (for the following Employment Equity targets. PROGRAMME INFORMATION The Santam Learnership Programme is an entry-level transformation while on the learnership. Applicants must not have been on a Short -Term Insurance Learnership through INSETA
in the HR solutions field.Â
The Chief Technology Officer (CTO) will provide sound technical leadership vision and leading all aspects of the Group’s technology development. The position will include overseeing overseeing all technical aspects and technological resources of our organisation for the purpose of organisational establishing a technological vision for an organisation and leads the company's technological development stakeholders and customers to ensure our company’s technologies are developed and used appropriately.
NEW EMPLOYMENT AVAILABLE Title: D365 Information Systems Analyst Area: Gauteng Industry: Group IT Department (Negotiable) An opportunity for an experienced D365 INFORMATION SYSTEMS ANALYST (with Microsoft Systems certification) the link between the business and IT, ensuring information systems requirements are delivered upon through supporting information systems. Execute and manage information systems projects Review information systems their technical feasibility. Execute and manage information systems related projects, ensuring each project
mechanisms that protect the company's network and information systems against breaches, viruses, and Antispyware;
resources;
- Develop and implement standardised Information Security processes and procedures;
- Respond
managed and configured properly;
- Ensure Information System compliance and conformance to IT policies
assessments;
- Research, plan, and implement information security technical solutions to meet business
Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
analysis. ✓ Bachelor's degree in Computer Science, Information Systems, or a related field. ✓ Proven experience
drives the implementation of an organisation-wide information security strategy aligned with the client's business Contributes towards establishing and maintaining information security policies, procedures, standards, and identification, assessment and management of information security risks across the organisation, including standards. Assesses and selects appropriate security technologies and solutions to protect client's digital assets to executive leadership and stakeholders. Stays informed about emerging security threats and industry trends
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and all technology projects, systems, and services •Provide leadership to the enterprise's information security overall business technology planning, providing current knowledge and future vision of technology and systems or possible breaches of electronic data and information systems, as well as their origins; coordinate