Get new jobs by email
- ...SUMMARY: Our client is looking for a sharp and proactive IT Security Engineer to help safeguard their IT and business environments. POSITION INFO: Detect threats, respond to incidents, and continuously strengthen security posture Implement, manage, and monitor...
- ...SUMMARY: - POSITION INFO: Our Client a Global company would like to find a skilled IT Security Specialist Are you a proactive problem-solver with a passion for safeguarding digital infrastructure? My client is looking for a dedicated IT Security Specialist...
- ...THE JOB: The main purpose of this role is to protect our Organization’s IT systems and date from potential threats and breaches. This role is responsible for implementing and maintaining security measures to safeguard the Organization’s digital assets and ensure the...
R 650,000 - 800,000 pa
...Renewable Energy company with their search for a IT Specialist, based in the northern suburbs... ...systems, ensuring system stability, security, and performance . Implement and... ...training, and act as an internal technology advisor to stakeholders. Key Requirements...- ...minimisation of loss associated with uncertain information and cyber security risks throughout the ICT and business environment. The... ...consultancy with respect to risk management practices and concerns within IT and business architectures, applications, changes, solutions and...
- ...Our client has an opportunity available for an IT Security Auditor based in Johannesburg. Requirements: Computer science or a similar field bachelor's degree is compulsory. Five or more years of experience in jobs involving cybersecurity. Working knowledge...
- ...SUMMARY: Are you a seasoned Information Security Engineer who thrives in complex environments and enjoys designing secure, scalable... ...Job Experience and Skills Required: ~ Diploma or Degree in IT / Computer Science / Cybersecurity ~ Seniorâlevel certifications...
- ...SUMMARY: Ensure the security and integrity of organisational data, systems, and networks by proactively identifying and mitigating cyber... ...vulnerability scanning solutions. Apply now! For more IT jobs, please visit / I also specialise in recruiting in the...
- ...financial services organisation is seeking an experienced Information Security Manager to lead enterprise-wide cybersecurity strategy,... ...standards). Partner with executive leadership and divisional IT heads to align security posture across business units. Monitor...
- ...SUMMARY: We have an exciting opportunity for an experienced IT Manager with previous management experience to join a well-established... ...Maintenance: Ensure daily system backups are completed and securely stored, including offsite copies. Maintain all hardware in...
- ...At Salix Recruitment, we are passionate about connecting top IT Audit talent with leading organisations nationwide. We constantly... ...audit teams on technology risk assessments Review information security controls, access management practices, and change management processes...
- ...staying one step ahead. Our client is looking for a Information Security Manager to lead their cybersecurity strategy, governance, and operations... ...and specialists Skills & Experience: Minimum 8+ years in IT Security with at least 5 years in a leadership role Proven...
- ...organisation is seeking a detail-oriented and professional Legal Advisor to support the legal department with drafting, reviewing, and... ..., policies, and standardised templates Maintain and update securities register Attend internal and client meetings as required...
- ...global professional services firm is looking for an experienced IT Audit Manager to join its Technology Risk – Assurance team.... ..., work closely with financial audit teams, and act as a trusted advisor to senior stakeholders — all while contributing to innovative audit...
- ...established organisation is seeking an experienced Information Security Engineer to join its technology team on a permanent basis. This... ...report on potential threats, vulnerabilities, and weaknesses across IT systems, applications, and networks. Conduct risk assessments...
R 40,000 per month
...SUMMARY: Looking for a skilled IT Technician with 3-5 years of experience to ensure the stability and security of our IT infrastructure and systems. Temporary position in Kempton Park - Close to OR Tambo on a 3-month contract. POSITION INFO: Job Title...- ...SUMMARY: - POSITION INFO: We are seeking a skilled IT Security professional with 3–6 years’ experience in security operations, endpoint security, and SOC or security engineering environments. The role involves detecting, analysing, and remediating malicious activity...
- ...trust and delivering exceptional client engagements. The Financial Advisor (Activations) provides exceptional client value through... ...measurable impact on financial literacy, protection, and long-term security by transforming financial advice into an inclusive, empowering...
- ...where technology becomes the heartbeat of transformation! As the IT & Digital Transformation Manager , you'll lead the modernisation... .... Work closely with Risk and Compliance to maintain a secure and compliant technology environment. Lead digital initiatives...
- ...aligning with business leadership Drive architecture & operational security across hybrid cloud, Microsoft 365 security stack, identity... ...communication skills Qualification: Bachelor’s degree in IT / Computer Science , plus certifications such as CISSP, CISM,...
- ...SUMMARY: Legal advisor | Centurion POSITION INFO: Role: Legal advisor Category: Legal and Compliance Location: Centurion... ...disciplinary project teams, including tax, marketing, compliance, and IT. Ensure efficient management of contracts through the entire...
R 25,000 per month
...SUMMARY: IT ENGINEER (DEVELOPER) Western Cape, Gouda R25 000 per month Our client seeking a skilled IT Systems / Software... ...ensure IT solutions align with operational needs Ensure data security, system integrity, and compliance with IT policies and standards...- ...SUMMARY: Our client is looking to appoint an experienced IT Audit Assistant Manager / Supervisor to strengthen its Internal Audit... ...Controls, Application Controls, IT Governance, and Information Security. In addition to hands-on audit delivery, you will perform technical...
- ...paced express courier and logistics leader is on the hunt for an IT Manager to power and scale its national operations. POSITION INFO... ...: Own the planning, delivery, and ongoing management of secure, reliable IT systems across South Africa Lead the local IT team...
- ...SUMMARY: Exciting IT Delivery Manager role in Gauteng POSITION INFO: Our client is a leading financial services and investment... ...focus on innovation, digital transformation, and the delivery of secure, scalable technology solutions within a regulated environment....
- ...SUMMARY: - POSITION INFO: IT Software Developer required for a reputable company based in East London REQUIREMENTS... ...ETL tools, or scripting. Ensure applications meet compliance, security, and performance standards. Provide Tier 2/3 support for escalated...
- ...Our client in Port Elizabeth is seeking a skilled and motivated IT Technician to join their team. The successful candidate will... ...equipment and software licenses. Ensured compliance with data security, privacy, and backup procedures. Assisted with IT projects, system...
- ...financial services organisation is seeking a Senior Information Security Engineer to join its growing technology team. POSITION INFO:... ...Education & Certifications Diploma or Bachelor’s degree in IT, Computer Science, or related field. CISSP, CISM, or equivalent...
- ...one is for you. Our client is looking for a Senior Information Security Engineer to help strengthen and evolve their security landscape... ...architecture projects Qualification: Diploma or Bachelors Degree in IT, Computer Science or related field CISSP, CISM, or equivalent...
- ...Pretoria and Sandton (Hybrid position) is searching for an Information Security Engineer - Hybrid to join their team. Job Purpose: ~... ...and report possible threats, vulnerabilities, and weaknesses in IT systems, applications and networks. Perform regular risk assessments...

