Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's department. As the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's department. As the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related improving the security posture. Responsibilities: · Oversee information systems and company security; · Evaluate
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Certified Information Security Manager KPAs
Develop and Implement Cybersecurity
Job Title: Information Security Manager (ISM)
Job Type:
JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring appropriate
for the security of information assets. The ISM safeguards information by seeing that security risks are
The ISM is the centre of competence for Information Security, providing an advisory services role and
and acting as the focal point for security compliance-related activities and responsibilities.
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management enterprise information security and IT risk management program to ensure that information assets are Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
solutions field.Â
The Chief Technology Officer (CTO) will provide sound technical leadership in
Reporting to both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The IT staff, budgets, and resources. Ensuring the security and integrity of the university's IT systems,
Manager: Security Operations, the successful incumbent is accountable to provide physical security services safety of employees, property, information, stakeholders, relevant RAF offices as well as hospitals in line Control all security registers. Investigate security breaches and compile reports. Undertake security threat measures. Develop post orders for security personnel. Monitor a security-guarding contract. Reporting Contribute progress updates and/or inform management decisions. Event Security Coordinate security services during Board/
Manager: Security Operations, the successful incumbent is accountable to provide physical security services safety of employees, property, information, stakeholders, relevant RAF offices as well as hospitals in line Control all security registers. Investigate security breaches and compile reports. Undertake security threat measures. Develop post orders for security personnel. Monitor a security-guarding contract. Reporting Contribute progress updates and/or inform management decisions. Event Security Coordinate security services during Board/