Get new jobs by email
- ...SUMMARY: - POSITION INFO: The Group currently has a vacancy for a Regional Security Manager to join the team at the Gauteng Head Office. The successful candidate will manage and oversee the Security Operations of the Gauteng and Mpumalanga regions. The successful...
- ...Requirements: ~8 years' working in Cyber Security of which: ~5 years has been managing security operations and teams. ~3 years has been managing... ...Security supplier performance ~ Expert knowledge of Information Security tools and techniques, IT Governance standards...
- ...looking for an experienced and dynamic Chief Information Officer (CIO) to lead their IT... ...organization’s IT strategy, ensuring the security and efficiency of their systems, and leading... ...alignment with business objectives. Lead and manage the IT department, fostering a culture...
- ...POSITION INFO: POSITION REQUIREMENTS Daily inspection of security equipment and arrange for repairs or calibration where needed... ...security status, updates, and actual or potential problems to Management Conduct site investigation and report on findings Oversee...
- ...We are seeking a dynamic and experienced Information Security Manager to lead our efforts in safeguarding sensitive information and maintaining robust security frameworks. The successful candidate will play a key role in managing information security risks, implementing...
- ...Corporate stores within Cash Crusaders, relating to Operational Risk, Security, Safety and Loss prevention. The ideal candidate will have a... .... Duties & Responsibilities The Risk and Security Manager will execute on our security initiatives and risk strategy of the...
- ...looking for a dynamic and visionary Chief Information Officer (CIO) to join their executive... ...administrative capabilities – proven ability to manage systems, budgets, and processes... ...a CIO who: Has deep experience in secure digital transformation within financial...
- ...Main Purpose of the Job: We are seeking a skilled and experienced Information Security Manager (ISM) to oversee and manage the overall planning, implementation, and management of the organisation’s information security strategies. The ideal candidate will be responsible...
- ...Our client has an opportunity available for an Information Security Analyst. Requirements: ~5 years experience within either an Information... ...for security technologies. Contribute to project risk management consulting and technical reviews, drafting mitigation plans...
- ...Our client has an opportunity available for an Information Security Officer based in Selby. Requirements: ~7 years experience in Technology Security or Risk Management roles of which should include: ~4 years in Technology Policy writing. ~4 years experience in...
- ...SUMMARY: Role Overview: As a Security Operations Specialist, you will play a key role in our Security Operations Center (SOC... ...tracking, and deployment of security solutions. IT Service Management: Log, manage, and implement changes within the Organizational...
- ...Our client has an EE opportunity available for an Information Security Analyst based in Selby. Requirements: Bachelors degree in information... ...meet or exceed defined SLAs/. Conduct risk and quality management within your area of responsibility. Create awareness of...
- ...client in the telecoms sector is seeking a professional Systems Security Architect/Cyber Security Architect on a contract duration of 6... ...deliverable is the relevant lockdown scripts, vulnerability management scan profiles, presentation deck and supporting documentation...
- ...We are seeking a Senior Software Developer specializing in secure software development to join our team. This position is ideal... .... POSITION INFO: Requirements: A bachelor’s degree in information technology, computer science, computer systems engineering or...
- ...Our client has an EE opportunity available for an Information Security Officer based in Selby. Requirements: ~7 years experience in technology security or risk management roles of which should include: ~4 years in technology policy writing. ~4 years experience...
- ...Our client has an EE opportunity available for an Information Security Analyst based in Selby. Requirements: ~5 years experience within... ...resolve vulnerabilities in networks, servers etc. Support with managing vendor resource deliverables to ensure service consistency....
- ...supports urban development by enhancing management efficiency, enabling autonomous city... ..., The Company focuses on strengthening security systems, increasing operational productivity... ..., technical documentation, and product information in line with customer requirements and...
IT/OT Infrastructure Architect- Contract- Mining (Information Technology and Operational Technology)
R 700 - 735 ph
...SUMMARY: IT/OT Infrastructure Architect- Contract- Mining (Information Technology and Operational Technology) POSITION INFO: Our... .... Responsibilities Participate in the global process to manage new technology ideas and demands, providing research, analysis...- ...SUMMARY: Our client is looking for a talented Security Analyst who is ready to take on a variety of security assessments and grow their career in a high-energy, cutting-edge environment. Responsibilities: POSITION INFO: Our client is looking for a talented Security...
- ...Middle East is seeking an experienced Chief Information Officer (CIO). Overview: As the... ...play a pivotal role in overseeing the management and development of the hospital's... ...such data for the specific purpose of securing you either permanent or temporary employment...
- Hire Resolve's client is looking for a dynamic and results-driven Business Development Manager with a passion for cybersecurity to join their team in Johannesburg. Responsibilities: Identify and pursue new business opportunities within the cybersecurity sector...
- ...POSITION REQUIREMENTS Manage AtTheGate access system back end functions Daily Management of all Smart sheet functions Filing... ...Arranging nonspecific Polygraph tests for various branches Managing security officer timesheets Compilation of weekend planned work...
- ...Enterprise Security ArchitectJohannesburg - Gauteng - South Africa ENVIRONMENT: Our... ...Lead: Technical customer relationship management to support Makwa IT to delivery on relevant... ...security support and maintain of the information security management systems and posture...
- ...We are looking for a capable System Security Engineer, who enjoys security work and possesses... ...of computer systems, networks and information Identify and define system security... ...software, authentication systems, log management, content filtering, etc Experience with...
- ...currently seeking a highly skilled Cyber Security Engineer for our client, a leading... ...security awareness. Work with IT/OT Managers and third parties to execute against the... ...Cybersecurity Framework (NCSF). Certified Information System Security Professional (CISSP) or...
- ...detail-oriented SOC Specialist to join our Security Operations Centre (SOC) team. The SOC... ...response, and cybersecurity risk management. This role involves analyzing security... ...security logs and alerts using SIEM (Security Information and Event Management) tools. Analyse...
- ...experience in Cybersecurity, engineering, or security vulnerability remediation ~ In-depth... ...methodologies ~ Bachelors degree in Information Security or similar ~ Industry... ...technology (IT) security trends Maintain, manage and upgrade agent-based security tools....
- Spartak Security seeks experienced Operational Manager. Min 5 yrs security management, PSIRA Grade B. Email your CV with references, copy of Driver's License, copy of PSIRA certification, urgently.If you get no response within 60 days, consider the position filled.
- ...basis and will work under the direction of the CLIENTs Project Manager or Team Leader. You will collaborate closely with CLIENTs... ...No formal training materials or courseware will be provided; information transfer is informal and occurs during regular collaboration....
- ...vulnerabilities, and providing actionable recommendations to enhance security posture. This role requires expertise in web application... ...for more info Please note that by submitting your personal information to Deka Minas you free-willingly issue the business consent to...