/>Certified Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager
Manager.
CISA Certified Information Systems Auditor - preferable.
CDPSE Certified Data Privacy
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
/>Experience in:
Implementation and managing information security solutions in the following environments:
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
Requirements:
Operations Manager (Information Technology)
We are seeking an Operations Manager effective management of people, process, and technology. The incumbent will also be a trusted advisor transform IT services by continually improving technology, service delivery, cost efficiency, and customer
highest standards of information security. We are seeking a dedicated Information Security Officer to join drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you linchpin for information security efforts, responsible for developing and executing our security strategy enhancing the security posture. Key Responsibilities: Oversee the security of information systems and the overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and implement information security policies and procedures to safeguard company data and information systems
modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS 5. Telecommunication Information Security Officer We seek an Information Security Officer to join our department. As the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related
modern software development, digital and data technologies and vendors, with a focus on Microsoft, AWS 5. Telecommunication Information Security Officer We seek an Information Security Officer to join our department. As the Information Security Officer, you will be responsible for the information security vision, strategy abilities to assist the team in improving the security posture of the Client. Purpose : Assist the management the security strategy and updating the security framework. Responsibilities also include security-related
Job Title: Information Security Manager (ISM)
Job Type:
/>MAIN JOB PURPOSE:
The Information Security Officer (ISM) is accountable for ensuring
for the security of information assets. The ISM safeguards information by seeing that security risks are
The ISM is the centre of competence for Information Security, providing an advisory services role and
and acting as the focal point for security compliance-related activities and responsibilities.
& Responsibilities: •Promote and manage IT security and privacy awareness training and education for teachers, and staff, as well as create proper security incident notification protocols. •Promotes the the IT organisation to develop and manage the IT security infrastructure, as well as providing management enterprise information security and IT risk management program to ensure that information assets are Head of IT and regional IT Team to ensure that IT security measures are built into all internal, interfaced