Responsibilities
Manage Company information technology and computer systems
Plan, organize, control and evaluate IT and electronic data operations... ...and software used by the company is up to date
Ensure security of data, network access and backup systems
Act in...
...a new challenge? Join our team at VTL UK Ltd as a Supply Chain Manager, where you will play a critical role in optimizing our supply chain... ...and cost-effectiveness.
Negotiate contracts and agreements to secure favorable terms.
Inventory Optimization:
Implement...
...dynamic and visionary leader to serve as Managing Director for our office in... ...Development, Licensing, Distribution, etc.) to inform the overall strategy and ensure alignment... ...sustainability while generating new revenue streams; securing resources and leading staff to achieve...
The Business Development Manager represents the company’s client-facing brand and will be responsible for creating and driving effective sales management strategies to generate revenue; proactively identifying opportunities for business growth through new and renewed sales...
...SUMMARY:
We are looking for a Information Security Specialist to plan, manage, and administer the network security on a contract role.
POSITION INFO:
Responsibilities
- Design, install and manage security mechanisms that protect the company's network and information...
R 75,000 per month
...staying ahead of cyber threats and devising innovative security solutions? Join our client as an Information Security Specialist to protect vital information... ..., COBIT.
Knowledge Area:
- Knowledge of Patch Management or Anti-virus, or Vulnerability Management.
-...
...the best practices of the Vulnerability Management solution and that of industry standards... ...and Vulnerability Management security solutions and provide enhancements for... ...vulnerability management solution
Maintain information security technology management based on...
...committed, hardworking and motivated individual to join their Security team as a Security Manager. The successful applicant will be responsible for the... ...are enforced and adhered to
Evaluating all collated information and documentation
Keep costing of all security...
...implement IS and Tech GRC strategy and, manage the end to end governance, risk and compliance... .... Qualifications University degree in information technology, engineering Professional... ...Auditor (CISA), Certified Information Systems Security Professional (CISSP) and / or Certified...
...Requirements:
~8 years' working in Cyber Security of which:
~5 years has been managing security operations and teams.
~3 years has been managing... ...Security supplier performance
~ Expert knowledge of Information Security tools and techniques, IT Governance standards...
...execution of the cyber resilience risk management framework that includes implementation... ...cyber risk assessments, strategy, cyber security programme, policies, standards, reporting... ...with all stakeholders with regards to information security.
Actively executes the...
...Middle East is seeking an experienced Chief Information Officer (CIO).
Overview: As the... ...play a pivotal role in overseeing the management and development of the hospital's... ...such data for the specific purpose of securing you either permanent or temporary employment...
...Information Security Engineer will be responsible for ensuring the security of our information systems and protecting them against unauthorised... ...balancing, and other network protocols .
Proficient in managing and configuring Active Directory and Linux operating...
...SUMMARY:
Purpose of the role:
~ The SAP Security PM role is responsible for the implementation, configuration, and maintenance... ...Authoirzations, Fiori SAP GRC
Responsibilities:
Lead and manage SAP projects related to authorization implementation, SAP Fiori...
...SUMMARY:
Cyber Security Analyst to join the team and assist with tasks at hand.
POSITION INFO:
We have an exciting opportunity... ...work experience as a Cyber Security Analyst
Experience in information security
Experience in computer network penetration testing...
...SUMMARY:
-
POSITION INFO:
A Security firm is looking for experienced candidate to work as a Personal Assistant, in Midrand... ...Responsibilities:
Financial statements
Supporting Senior Management
Diary management
Travel and accommodation bookings
Event...
R 8,500 per month
...SUMMARY:
Reaction Officers Urgently Needed
A well-established Security Company is urgently seeking trustworthy and well-disciplined Reaction Officers to respond in Roodepoort. The candidates will be required to work in the following areas:
Randparkridge...
...SUMMARY:
Design, implement, and maintain robust security measures that safeguard sensitive information
POSITION INFO:
Qualifications:
• Bachelor's... ...Professional (CISSP)
• Certified Information Security Manager (CISM)
• Certified Ethical Hacker (CEH)
•...
...SUMMARY:
Business Development Manager -Africa sales
POSITION INFO:
Hybrid Position... ...experience in the following industries: Security or IT or Telecomms experience with sales... ...experience essential in the Security or Information technology or telecomms environment...
...innovation, flexibility, and integration with technology.
• Managing of the Reservations budget and ensuring that this is effectively... ...Reservations, Finance and Operations - ensuring the flow of information is correct for ease of information flowing to Camps .etc.
• Managing...
...SUMMARY:
As a Financial Accountant you will step into the dynamic world of the burgeoning Information Technology (IT) industry, where innovation is the currency, and possibilities are boundless.
POSITION INFO:
Company & Job Description:
In today's interconnected...
Main Purpose of the role is to manage and deliver information security operational tasks which assess and monitor the security of applications infrastructure data and overall health of the Company IT Security landscape.
Minimum Requirements:
•Grade 12/Matric...
...SUMMARY:
APPLY NOW
POSITION INFO:
Senior Security Expert - Gauteng
12 Month Contract – Remote
Purpose of Position:... ...Attach your Microsoft Word CV, and complete all the required information – Please Note: Companies may expire jobs at their own discretion...
...SUMMARY:
IT SECURITY SPECIALIST -(FORTINET SECURITY CERTIFIED) – HYBRID
POSITION... ...and other threats. Work closely with the Information & Digital Technology team members and other... ...Policies & Procedures
Incident Management & Reports
Security Education, Communication...
R 15,000 per month
The Security Systems Installation Technician is responsible for the professional installation, configuration, and maintenance of CCTV cameras, alarm systems, gate motors, electric fencing, and access control technologies for residential, commercial, and industrial clients...
...Introduction
A vacancy exists for an IT Security Operations Manager, reporting to the Head: Technology Services. The IT Security Operations... ...manages the day-to-day operational aspects of the Information Security environment. This involves managing the activities...
R 25,000 - 30,000 per month
...SUMMARY:
IT Security Technology Support Engineers required for a leading IT managed security solutions company.
POSITION INFO:
R25 000 - R30 000 per month.
Seeking inspired IT Security Technology Support Engineers to join a highly motivated and energetic team...
R 70,000 - 80,000 per month
Information Systems Manager - Hospitality & Hotel Hub - JhbFull job descriptionA full job breakdown will be discussed on shortlisting but it focused... ...communicationcyber securitynetwork and information security and safetyserver environmentcompliance and governanceThe role...
...SUMMARY:
Join our team as an Operations Engineer – Feature Owner Security Tools (Senior), where you will play a pivotal role in... ...and Response solutions
- Knowledge of Cloud and On-Premise Information Security
- Experience with cloud technologies (Azure, AWS)...
The Information Specialist will support the monitoring and evaluation team within the Corporate... ...this role is to ensure efficient data management, knowledge sharing, and information... ...ensuring data quality, integrity, and security. Knowledge Sharing: Facilitating the sharing...