provider renowned for their robust corporate governance and commitment to legal and regulatory excellence They are currently on the lookout for a Governance Officer to fortify their team in the vibrant heart zest for governance and a knack for legal compliance to join their esteemed corporate governance team. This environment. If you're passionate about shaping governance frameworks and have a meticulous eye for legal Responsibilities: Champion the development and refinement of governance frameworks alongside the Company Secretary. Vigilantly
provider renowned for their robust corporate governance and commitment to legal and regulatory excellence They are currently on the lookout for a Governance Officer to fortify their team in the vibrant heart zest for governance and a knack for legal compliance to join their esteemed corporate governance team. This environment. If you're passionate about shaping governance frameworks and have a meticulous eye for legal Responsibilities: Champion the development and refinement of governance frameworks alongside the Company Secretary. Vigilantly
solutions field.Â
The Chief Technology Officer (CTO) will provide sound technical leadership in
Â
Â
Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite Fulltime) drives the implementation of an organisation-wide information security strategy aligned with the business objectives Contributes towards establishing and maintaining information security policies, procedures, standards, and identification, assessment and management of information security risks across the organisation, including to executive leadership and stakeholders. Stays informed about emerging security threats and industry trends
standards of information security. We are seeking a dedicated Information Security Officer to join the Overview: As the Information Security Officer, you will be the linchpin for information security efforts developing and executing our security strategy, governance, and processes. Your role will also encompass Key Responsibilities: Oversee the security of information systems and the company's overall security stance infrastructure of IT systems. Respond promptly to all information security incidents. Develop and sustain controls
Reporting to both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The completion, on time and within budget. Oversee IT governance and compliance to ensure that the organization's
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's department. As the Information Security Officer, you will be responsible for the information security vision vision, strategy, governance, management, processes and user education. The role also requires technical Responsibilities also include security-related governance, management and processes. The role includes security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report
Telecommunication Information Security Officer We seek an Information Security Officer to join our Client's department. As the Information Security Officer, you will be responsible for the information security vision vision, strategy, governance, management, processes and user education. The role also requires technical Responsibilities also include security-related governance, management and processes. The role includes security posture. Responsibilities: · Oversee information systems and company security; · Evaluate, report
company is urgently looking for a Chief Information Officer / CIO to be responsible for the technology be to take responsibility for the company's information technology, computer systems with duties including following is required: Degree in Computer Science, Information Technology or a related field Minimum of 10 years to email your CV to nicolelbedifferent.co.za Information displayed above not limited to advertisement advertisement. Please contact for further information. Please consider your application as unsuccessful if you have
: Certified Information Systems Security Professional
CISA: Certified Information Systems Auditor Auditor
CISM: Certified Information Security Manager KPAs
Establish strong governance and assurance controls and processes to continuously about security software and best practices for information security.