R 55 000
R 55 426
a month
... architectures and processes Software Development Cyber Security Software Development Lifecycle Software Engineering ... Cyber Security/Information Security Knowledge in information security software development and engineering. Knowledge of cyber security ...
17 days ago
R 55 000
R 55 426
a month
... architectures and processes Software Development Cyber Security Software Development Lifecycle Software Engineering ... Cyber Security/Information Security Knowledge in information security software development and engineering. Knowledge of cyber security ...
17 days ago
... , with a strong emphasis on cyber security and emerging risks. Direct ad ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ...
3 days ago
... , with a strong emphasis on cyber security and emerging risks. Direct ad ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ...
3 days ago
... , with a strong emphasis on cyber security and emerging risks. Direct ad ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ...
3 days ago
... , with a strong emphasis on cyber security and emerging risks. Direct ad ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ... Advanced knowledge of IT auditing, cyber security, governance frameworks (King Code, COSO ...
3 days ago
... IT, data analytics and cyber security expertise to the Internal ... delivering IT, BCP and cyber security reviews across different clusters ... / BCP/ DRPs/ ITGC/ cyber reviews/ application controls etc.) ... Technology Risk, Data Risk, Cyber Risk Maturity Model) by ...
6 days ago
... Providing IT, data analytics and cyber security expertise to the Internal Audit ... deliver ITGC (ISA315), application and cyber security reviews across different clusters and ... (e.g., Technology Risk, Data Risk, Cyber Risk Maturity Model) by conducting ...
7 days ago
... : Software Engineering Principles Software Development Cyber Security/Information Security
21 days ago
... environments, legacy tool migration, and cyber security initiatives. Lead automation scripting efforts ...
a day ago
R 41 667
R 55 000
a month
... · Degree in IT. · Ethical Hacking/Cyber Security Certification. · Microsoft Application Development and ...
24 days ago
R 41 667
R 55 000
a month
... · Degree in IT. · Ethical Hacking/Cyber Security Certification. · Microsoft Application Development and ...
24 days ago
R 41 667
R 55 000
a month
... · Degree in IT. · Ethical Hacking/Cyber Security Certification. · Microsoft Application Development and ...
24 days ago
R 41 667
R 55 000
a month
... · Degree in IT. · Ethical Hacking/Cyber Security Certification. · Microsoft Application Development and ...
24 days ago
R 41 667
R 55 000
a month
... · Degree in IT. · Ethical Hacking/Cyber Security Certification. · Microsoft Application Development and ...
24 days ago
R 41 667
R 55 000
a month
... · Degree in IT. · Ethical Hacking/Cyber Security Certification. · Microsoft Application Development and ...
24 days ago
... ICT related field (advantageous) CompTIA Security+ Certification MCSA Microsoft Certified Solutions ... systems, networks, and data from cyber threats. This includes antivirus software ... , networks, and data from cyber threats. This includes antivirus software ...
9 days ago
... ICT related field (advantageous) CompTIA Security+ Certification MCSA Microsoft Certified Solutions ... systems, networks, and data from cyber threats. This includes antivirus software ... , networks, and data from cyber threats. This includes antivirus software ...
9 days ago
... ICT related field (advantageous) CompTIA Security+ Certification MCSA Microsoft Certified Solutions ... systems, networks, and data from cyber threats. This includes antivirus software ... , networks, and data from cyber threats. This includes antivirus software ...
9 days ago
... collaboration, working with Chief Information Security Officers (CISOs), Chief Information ... robust protection against cyber threats, and aligning security initiatives with business ... , and drive innovation in security technologies and services. Key ...
28 days ago