Get new jobs by email
- ...The purpose of the role: The role of the Manager: Cybersecurity includes contribution to technical insights relevant to client engagements... ...responsible for managed services - Performance management (Cyber Strategy and Planning, Testing and Verification, GRC, Security Risk...
- ...Your Mission (Cupid’s Cyber Edition): Detect and monitor threats before they can break hearts—or systems Investigate incidents... ...attack simulations to test organisational resilience Produce management reports that make security insights irresistible Get hands-...
- ...in carrying out ICT operations. Key Performance Areas Cyber Security Set strategy for sustained implementation of cyber... ...of ICT Security Initiatives Partner with ICT Senior Management to integrate all ICT security and Cyber security plans with information...
- ...meet their needs. Role Requirements Overseeing incident management and ticket performance for MSS and Global SOC Teams Co-ordinating... ...security frameworks such as NIST, MITRE Attack and Lockheed Cyber Kill Chain. Experience in working across security...
- ...Description: Brief Description Reporting to the Manager- Cybersecurity Architecture & Assurance, the Cyber Security Solutions Engineer will be responsible for designing and implementing cyber security solutions that protect critical assets across the markets, Hub...
- ...remediation. Reviewing server, network, and application security. Managing endpoint protection and verifying patch compliance.... ...candidate must meet the following requirements: Degree in Cyber Security, Information Systems, or Computer Science. Security...
- ...Cyber Security Specialist (Manufacturing) Location: Centurion, Pretoria, South Africa Salary: Market Related Our client in the manufacturing industry is looking for a Cyber Security Specialist to provide end-to-end security solutions for the monitoring, assessment...
- ...Role title: Specialist – Cyber Security GRC Duration: 12 months Key Accountabilities and Decision Ownership: Continually... ...cyber threats in coordination with Enterprise Risk Management team Monitor and drive compliance to internal and global cyber...
- ...Cyber Security Specialist: Engineering About Redherd Redherd is a specialist technical cybersecurity recruitment firm supporting... ...Orientation Plans and executes activities aligned to strategy. Manages competing priorities and resources effectively. Considers financial...
- ...Incident Detection and Response - Investigating security alerts, documenting incidents, and taking action against cyber threats. Security Infrastructure Management - Configuring and deploying security tools to protect an organization's network. Disaster Recovery Planning...
- ...cybersecurity platforms, contributing to platform licensing oversight, infrastructure investment planning, technology lifecycle management, and OPEX/CAPEX cost optimisation initiatives in collaboration with the Group Manager. KEY PERFORMANCE AREAS: Infrastructure...
- ...Position: Cyber Security Analyst Location: Cape Town CBD Work from Office Only Working hours: Monday to Friday 10:00 am... ...Research/evaluate emerging cybersecurity threats and ways to manage them Generate reports for both technical and non-technical staff...
- ...JOB TITLE: Cyber Security Analyst - GRC LOCATION: Cape Town (Hybrid / Remote) ABOUT CYBERLOGIC: Cyberlogic is a trusted Managed Solutions Provider with offices in South Africa, Mauritius, and the UK. Serving a diverse range of clients, spanning numerous...
- ...An exciting opportunity has become available for an experienced Cyber Security Audit Executive to join Absa's Group Internal Audit as... ...over the Group's cyber security and information security risk management capability. The successful incumbent will manage the cyber audit...
- ...security, application and system vulnerabilities across IT landscape. Design and develop reports that will provide visibility to line managers in order to manage any risks within their respective areas relating to fraud, prevention of fraud and access to information....
- ...user devices Ensure high system availability and performance Manage uptime, backups, and disaster recovery IT Service... ...the company Supporting rapid headcount and infrastructure growth Protecting the organisation from cyber and operational risk...
- ...OPERATIONS, FACILITIES AND IT MANAGER Job Profile Job Title: Operations, Facilities and IT Manager Reporting to: College Head... .... Identify and mitigate IT risks, including risks related to cyber threats and system failures. Ensure compliance with relevant...
- ...scaling fast, and we're shaping a category defining, AI enhanced cyber security portfolio built for the MSP channel. As we approach $10... ..., we're looking for a commercially minded, strategic Product Manager to take ownership of one of our core product areas. If you...
- ...We’re seeking an experienced IT Manager to join our team and oversee the development, implementation and maintenance of our technology... ...Implement and maintain IT security measures to protect against cyber threats Plan and manage daily IT operations (systems, networks...
- ...This is a strategic leadership role responsible for managing the University’s media, communications, content, internal communication,... ...communication strategies with internal partners; stays current on cyber risks; builds capability through training; escalates risks...
- .... As we continue to grow, RCL FOODS is searching for a Audit Manager to join our Group Services Division . This position will be based... ...with IT General controls and Application controls. • Cyber Security and Digital and AI experience would be advantageous....
- ...fraud/misconduct prevention, detection, investigations and case management across the Group, business units and thirdâÃÂÃÂparty... ...fraud schemes and controls (procurement, payroll, revenue leakage, cyber-enabled fraud). ERM frameworks, risk quantification, control...
- ...Salary: R400,000 – R500,000 (DOE) We are looking for a dynamic, agile Project Manager t o deliver complex, high-end GRC projects for enterprise clients. Cognisys is a leading Cyber Security company specialising in Penetration Testing, GRC Consulting, and Managed...
- ...Stock Exchange (JSE) since 1964.What will you do? The Senior Manager: Group Forensic Services will have oversight and provide... ...civil litigation processes (3-5 years) Experience in conducting cyber related investigations (10-15 years) Drafting and reviewing of...
- ...float cycling, abnormal cash flows, collusive transactions) Cyber-enabled fraud (bots, scripted attacks, app tampering) Insider... ...experience within a non-traditional FinTech /ICT/Digital/Fraud Management environment Proven track record of building and deploying ML...
- ...JOB TITLE: SEO Manager LOCATION: Cape Town/Stellenbosch or Johannesburg (Hybrid) A BOUT HYPERCLEAR TECHNOLOGIES: Hyperclear... ...at the forefront of innovation, offering solutions that span cyber security, cloud infrastructure, business intelligence, robotic and...
- ...activities to engage potential clients. Explain the company's cyber security services and solutions to decision-makers. Schedule... ...and conduct meetings with potential clients. Sales Process Management: Manage the complete sales process, from lead generation...
- ...Underrepresented Groups Career Stream Enterprise Wide Risk Management Job Purpose Nedbank Insurance is seeking a highly skilled... ...& Regulatory Risk, Conduct Risk, Technology and Digital Risk, Cyber Risk, Data Risk, Sustainability (ESG) Risk, and excluding...
- ...JOB TITLE: Senior Technical Project Manager LOCATION: Hybrid/Remote, with offices in Stellenbosch and Johannesburg for in-person... ...maritime sector, Cyberlogic specialises in IT leadership, cyber security, cloud solutions, and business intelligence. For almost...
- ...ideal for a newly qualified CA(SA), coming out of an audit firm, who is ready to step into a role that combines finance, people management and commercial exposure. This is not a back-office role; it’s for someone who is eager to be involved in the business, manage...