Search Results: 7,172 vacancies
...SUMMARY:
We are looking for a Information Security Specialist to plan, manage, and administer the network security on a contract role.
POSITION INFO:
Responsibilities
- Design, install and manage security mechanisms that protect the company's network and information...
R 75,000 per month
...staying ahead of cyber threats and devising innovative security solutions? Join our client as an Information Security Specialist to protect vital information... ..., COBIT.
Knowledge Area:
- Knowledge of Patch Management or Anti-virus, or Vulnerability Management.
-...
...the best practices of the Vulnerability Management solution and that of industry standards... ...and Vulnerability Management security solutions and provide enhancements for... ...vulnerability management solution
Maintain information security technology management based on...
R 240,000 pa
We require a committed, hardworking and motivated individual to join our Security team as a Security Manager. The successful applicant will be responsible for the supervision of Security Supervisors and Security Officers. The Security Manager will be responsible for:...
...committed, hardworking and motivated individual to join their Security team as a Security Manager. The successful applicant will be responsible for the... ...are enforced and adhered to
Evaluating all collated information and documentation
Keep costing of all security...
...implement IS and Tech GRC strategy and, manage the end to end governance, risk and compliance... .... Qualifications University degree in information technology, engineering Professional... ...Auditor (CISA), Certified Information Systems Security Professional (CISSP) and / or Certified...
...Requirements:
~8 years' working in Cyber Security of which:
~5 years has been managing security operations and teams.
~3 years has been managing... ...Security supplier performance
~ Expert knowledge of Information Security tools and techniques, IT Governance standards...
...execution of the cyber resilience risk management framework that includes implementation... ...cyber risk assessments, strategy, cyber security programme, policies, standards, reporting... ...with all stakeholders with regards to information security.
Actively executes the...
...Middle East is seeking an experienced Chief Information Officer (CIO).
Overview: As the... ...play a pivotal role in overseeing the management and development of the hospital's... ...such data for the specific purpose of securing you either permanent or temporary employment...
...Information Security Engineer will be responsible for ensuring the security of our information systems and protecting them against unauthorised... ...balancing, and other network protocols .
Proficient in managing and configuring Active Directory and Linux operating...
...SUMMARY:
Purpose of the role:
~ The SAP Security PM role is responsible for the implementation, configuration, and maintenance... ...Authoirzations, Fiori SAP GRC
Responsibilities:
Lead and manage SAP projects related to authorization implementation, SAP Fiori...
...SUMMARY:
-
POSITION INFO:
A Security firm is looking for experienced candidate to work as a Personal Assistant, in Midrand... ...Responsibilities:
Financial statements
Supporting Senior Management
Diary management
Travel and accommodation bookings
Event...
...SUMMARY:
Cyber Security Analyst to join the team and assist with tasks at hand.
POSITION INFO:
We have an exciting opportunity... ...work experience as a Cyber Security Analyst
Experience in information security
Experience in computer network penetration testing...
R 8,500 per month
...SUMMARY:
Reaction Officers Urgently Needed
A well-established Security Company is urgently seeking trustworthy and well-disciplined Reaction Officers to respond in Roodepoort. The candidates will be required to work in the following areas:
Randparkridge...
...SUMMARY:
Design, implement, and maintain robust security measures that safeguard sensitive information
POSITION INFO:
Qualifications:
• Bachelor's... ...Professional (CISSP)
• Certified Information Security Manager (CISM)
• Certified Ethical Hacker (CEH)
•...
...INFO:
Job Details: Title: Armed Security Guard Location: Pomona Kempton Park... ...to be discussed) Reports to: Security Manager Job Description: The Armed and Licensed... ...when needed. Provide assistance and information as required during investigations....
...SUMMARY:
Business Development Manager -Africa sales
POSITION INFO:
Hybrid Position... ...experience in the following industries: Security or IT or Telecomms experience with sales... ...experience essential in the Security or Information technology or telecomms environment...
...SUMMARY:
As a Financial Accountant you will step into the dynamic world of the burgeoning Information Technology (IT) industry, where innovation is the currency, and possibilities are boundless.
POSITION INFO:
Company & Job Description:
In today's interconnected...
Main Purpose of the role is to manage and deliver information security operational tasks which assess and monitor the security of applications infrastructure data and overall health of the Company IT Security landscape.
Minimum Requirements:
•Grade 12/Matric...
...SUMMARY:
IT SECURITY SPECIALIST -(FORTINET SECURITY CERTIFIED) – HYBRID
POSITION... ...and other threats. Work closely with the Information & Digital Technology team members and other... ...Policies & Procedures
Incident Management & Reports
Security Education, Communication...