seeking a data scientist to join their fight against fraud. In this role, you will use your expertise to uncover
positioning the organization as a key player in national fraud prevention.
Here's a breakdown of what
identify emerging fraud trends and vulnerabilities.
for Fraud and Risk to be responsible for developing and implementing strategies to mitigate fraud and organisation's operations. This role involves overseeing fraud prevention measures, analysing risk factors, and experience of 5 years in operations management (Fraud and Risk), preferably in the technology or financial management experience.
Fraud Operations:
Operations Manager (Information Technology)
We are seeking an Operations Manager Design
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The demonstrable senior managerial experience in an Information and Communication Technology (ICT) environment
Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report infrastructure of IT systems · Respond to all information security incidents; · Serve as a point of contact monitor a strategic, comprehensive enterprise information security and risk management program; · Work
Retail 5. Telecommunication Information Security Officer We seek an Information Security Officer to join department. As the Information Security Officer, you will be responsible for the information security vision security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report infrastructure of IT systems · Respond to all information security incidents; · Serve as a point of contact monitor a strategic, comprehensive enterprise information security and risk management program; · Work
/>
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
place for the security of information assets. The ISM safeguards information by seeing that security risks
standards. The ISM is the centre of competence for Information Security, providing an advisory services role
enterprise information security and IT risk management program to ensure that information assets are
enterprise information security and IT risk management program to ensure that information assets are confidential/private data. •Develop and enhance an information security management framework •Understand and services •Provide leadership to the enterprise's information security organisation •Partner with business or possible breaches of electronic data and information systems, as well as their origins; coordinate concerns, and malware threats. •Maintain an information security knowledgebase, including security advisories
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs