Search Results: 7,708 vacancies
...the Role:
The purpose of the job is to plan, manage, and administer the organizations network security, Ensure all network components are managed in accordance... ...that protect the organizations network and information systems against breaches, viruses, and Antispyware...
...SUMMARY:
-
POSITION INFO:
# Information Security Services
Development of Information Security Services capability and initiatives... ...processes.
Advise on and ensure the effective management of information technology and business processes access and...
...the best practices of the Vulnerability Management solution and that of industry standards... ...and Vulnerability Management security solutions and provide enhancements for... ...vulnerability management solution
Maintain information security technology management based on...
R 240,000 pa
We require a committed, hardworking and motivated individual to join our Security team as a Security Manager. The successful applicant will be responsible for the supervision of Security Supervisors and Security Officers. The Security Manager will be responsible for:...
...operational plans and KPIs in support of the function’s strategy and the TCTA’s overall strategy.
Drive the implementation of the Information Management strategies, plans and procedures to compliment and support the IT and TCTA strategies.
Assist in driving the...
...Our client has an opportunity available for an Information Security Officer based in Selby.
Requirements:
~7 years experience in Technology Security or Risk Management roles of which should include:
~4 years in Technology Policy writing.
~4 years experience in...
...committed, hardworking and motivated individual to join their Security team as a Security Manager. The successful applicant will be responsible for the... ...are enforced and adhered to
Evaluating all collated information and documentation
Keep costing of all security...
...Our client has an EE opportunity available for an Information Security Officer based in Selby.
Requirements:
~7 years experience in technology security or risk management roles of which should include:
~4 years in technology policy writing.
~4 years experience...
...Our client has an opportunity available for an Information Security Analyst.
Requirements:
~5 years experience within either an Information... ...for security technologies.
Contribute to project risk management consulting and technical reviews, drafting mitigation plans...
Summary PURPOSE:
• Manage security information and support the business by providing accurate, relevant, and timely business intelligence to support the overall security and business objectives. Provide input in the development and implementation of security strategies...
...Requirements:
~8 years' working in Cyber Security of which:
~5 years has been managing security operations and teams.
~3 years has been managing... ...Security supplier performance
~ Expert knowledge of Information Security tools and techniques, IT Governance standards...
R 75,000 per month
...staying ahead of cyber threats and devising innovative security solutions? Join our client as an Information Security Specialist to protect vital information... ..., COBIT.
Knowledge Area:
- Knowledge of Patch Management or Anti-virus, or Vulnerability Management.
-...
...Our client has an EE opportunity available for an Information Security Analyst based in Selby.
Requirements:
~5 years experience within... ...resolve vulnerabilities in networks, servers etc.
Support with managing vendor resource deliverables to ensure service consistency....
...Middle East is seeking an experienced Chief Information Officer (CIO).
Overview: As the... ...play a pivotal role in overseeing the management and development of the hospital's... ...such data for the specific purpose of securing you either permanent or temporary employment...
...Our client has an EE opportunity available for an Information Security Analyst based in Selby.
Requirements:
Bachelors degree in information... ...meet or exceed defined SLAs/.
Conduct risk and quality management within your area of responsibility.
Create awareness of...
...Information Security Engineer will be responsible for ensuring the security of our information systems and protecting them against unauthorised... ...balancing, and other network protocols .
Proficient in managing and configuring Active Directory and Linux operating...
...SUMMARY:
Purpose of the role:
~ The SAP Security PM role is responsible for the implementation, configuration, and maintenance... ...Authoirzations, Fiori SAP GRC
Responsibilities:
Lead and manage SAP projects related to authorization implementation, SAP Fiori...
...SUMMARY:
Cyber Security - Business Development Manager
POSITION INFO:
Dotcom Security is a cyber risk-centric organisation focused on defining... ...requirements:
~4 + years of experience in the Information technology and Information Security fields across multiple...
...SUMMARY:
Cyber Security Analyst to join the team and assist with tasks at hand.
POSITION INFO:
We have an exciting opportunity... ...work experience as a Cyber Security Analyst
Experience in information security
Experience in computer network penetration testing...
...SUMMARY:
-
POSITION INFO:
A Security firm is looking for experienced candidate to work as a Personal Assistant, in Midrand... ...Responsibilities:
Financial statements
Supporting Senior Management
Diary management
Travel and accommodation bookings
Event...