We use cookies to provide the essential functionality of the website and its advanced features, to analyse traffic and to improve our services to you, and to provide personalised content to you.
By clicking ‘Accept All’ you agree to these. You can change your selection at any time under the ‘Cookie Settings’ link on the page.
You can read more about our cookies in our Cookie Policy
Cookie Settings
We use cookies to provide the essential functionality of the website and its advanced features, to analyse traffic and to improve our services to you, and to provide personalised content to you.
By clicking ‘Accept’ you agree to these. You can read more about our cookies in our Cookie Policy
These cookies are essential to the functionality of thebigjobsite.com
When you log in to the Internet Site the Company will set a cookie containing a randomly generated unique reference number. This anonymous number allows the Company to identify you. The Company will never store your personal information directly as a cookie. A persistent cookie will be set, persistent cookies are not deleted when you close your browser, and will allow the Internet Site to recognise you on your next visit.
Name
Expiration
Description
ATTBCookie*
2 years
These cookies are used to remember a user’s choice about cookies on thebigjobsite.com. Where users have previously indicated a preference, that user’s preference will be stored in these cookies.
last-search
search
redirect-stage
original-keyword
1 day
Session
1 hour
1 hour
These cookies are used by thebigjobsite.com to pass search data between our own pages.
datadome
1 year
DataDome is a cybersecurity solution to detect bot activity
jjap
1 days
Used to track if you have seen the Job Alerts prompt. Job Alerts is a service you can subscribe to to receive information about new jobs.
Advanced features of the site use Cookies to provide information you requested and to reduce you having to key in repeated fields.
Name
Expiration
Description
attb-loc
3 months
Stores your location information so that we can pre-populate search fields to find jobs near you.
Analytic cookies allow the Company to see how the Internet Site is being used. This information forms the basis of future development work, and so enables the Company to continually improve its Internet Site to best suit its users.
Name
Expiration
Description
__gads
_ga
_ga_JH3TWMTYRK
_gat_gtag_UA_1462011_9
_gcl_au
_gid
_uetsid
_uetvid
13 months
2 years
2 years
1 minute
90 days
24 hours
1 day
16 days
Google Analytics: For purposes of analytics, your UserID may be tracked and sent to Google Analytics after you register for one of our services such as Job Alerts. After you register, your registered session may be stitched together with your original, unauthenticated session. This allows longer-term tracking to help us monitor the effectiveness of our marketing campaigns. No personally identifiable information, or data that permanently identifies your device, is sent along with your tracking IDs.
Create Email Alert
ⓘ There was an unexpected error processing your request.
Please refresh the page and try again.
If the problem persists, please contact us with your issue.
Email address is already registered
You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.
Would you like to [visit your alert settings] now?
Success! You're now signed up for Job Alerts
Get ready to discover your next great opportunity.
Job category: Medical Research and Laboratory Sciences Location: Roodepoort Contract: Permanent Business Unit: Constantia Kloof Remuneration: R 569,942.00 EE position: No Introduction The purpose of an Information Security Analyst role is to safeguard the organisation's information systems and data by identifying and analysing vuln
Information Security Analyst (POS24161)
Rivonia, Sandton
R 986 000 to R 1 080 000 per annum
Job Purpose
To collaboratively perform in-depth analysis with stakeholders on complex information security issues and provide optimum solutions which meet both business and technical requirements while aligning with the information security strategy. To supp
To source and analyse risk management information for the provision of insights that reflects the state of the various risk disciplines within the GFC. Internal reporting and information classification for GFC. Qualifications Minimum Qualifications Type of Qualification: First Degree Field of Study: Business Commerce Experience Required3-4 years Ex
Trans Union's Job Applicant Privacy Notice What We'll Bring: As a Senior Consultant, you should have 6-8 years of hands-on information security experience, and a Bachelor’s Degree in a related technical field. What You'll Bring: You should have expertise and experience in the following technical and professional areas: Experience with designing, de
Responsibilities
- Design, install and manage security mechanisms that protect the company's network and information systems against breaches, viruses, and Antispyware;
- Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining access privileges, control structures, and resources;
- Develop and implement s
Information Security Administrator page is loaded Information Security Administrator Apply locations Johannesburg time type Full time posted on Posted 3 Days Ago job requisition id R9066 Job Description Hello Future Information Security Administrator DWelcome to FNB, the home of the #changeables. We design for the
Job category: Banking, Finance, Insurance. Stockbroking Contract: Permanent Remuneration: Market Related EE position: Yes Introduction The Security Engineer plays a pivotal role in fortifying the organization's digital infrastructure against cyber threats and vulnerabilities. Tasked with designing, implementing, and maintaining robust se
These jobs were popular with other job seekers Information Security Engineer will be responsible for ensuring the security of our information systems and protecting them against unauthorised access, modification, or destruction. The role involves hands-on operations with various security tools and platforms, as well as the development and implement
Job Source: Levelup
Information security analyst iii
Johannesburg, Gauteng
R 300000 ZA Per annum
Nedbank Get a financial partner who will help, guide and support you on your personal journey. View company page 131663 (PKI Cryptography Security Systems)Job Family Information Technology Job Classification131663 (PKI Cryptography Security Systems)Job Family Information Technology Career Stream IT Risk Leadership Pipeline Manage Self: Expert Job Purpose To provide expert advice on complex aspects of information security within their fields of expertise. To identify and resolve complex technical issues related to security technologies. To collaboratively perform in-depth analysis with stakeholders on complex information security issues and provide optimum solutions which meet both business and technical requirements while aligning with the information security strategy. To analyse and enhance information security related processes with the aim to optimise work within the sphere of Information Security in its entirety. Working independently to deliver on work tasks. Pro-actively mentor staff. To ensure stability and up-time for areas the incumbent takes responsibility for; which also requires being available on demand to help solve issues outside of normal working hours Job Responsibilities Build relationships with stakeholders to facilitate the flow of knowledge, input and discussion on new products and solutions as required. Leverage on expertise and internal networks to manage and resolve incidents, strengthening relationships. Capture timesheets and claims timeously and accurately. Propose solutions that are cost effective while meeting information security (IS) requirements within budget. Provide input into the negotiation process with vendors for new and existing technologies and services. Contribute to a culture of transformation by participating in Nedbank culture building initiatives, business strategy, and CSI. Stay abreast of developments in field of expertise, ensuring personal and professional growth. Understand and embrace the Nedbank vision and values, leading by example. Seek opportunities to improve business processes, models and systems. Participate in Research and Development related to specific Information Security Technology. Participate in proof of technology and proof of concept. Contribute to the content of the curricula. Oversee the implementation of the changes and check for the shortcomings and risks. Expert in-depth interpretation of MIS and system logs/reports to correct any deviations against best practices. Identify and set selection criteria for new products. Participate in the implementation and hand over of new products as provided in the selection criteria. Keep abreast of information security policies, rules, standards and processes, procedures and practices, as well as business rules, introducing new industry concepts to information security. Create and review all relevant processes and procedures mindful of current policies and standards. Create, maintain and review information security standards. Oversee and monitor environment per set standards. Review and contribute to project documentation. Mitigate risks. Implement specific Information security technologies. Gain further exposure and experience on multiple technologies. Log, submit and implement low, medium and high risk security changes independently. Provide guidance and supervision to Administrators and other analysts on implementation and changes. Oversee and ensure change was success. Support the achievement of the business strategy, objectives and values. Enable skilling and required corrective action to take place by sharing knowledge and industry trends with team. Obtain buy-in for developing new and/or enhanced processes that will improve the functioning of stakeholders' businesses. Provide technical mentoring related to specific security product. Participate in defining career stream and role requirements. Attend tech security industry forums and present technical papers. Provide technical mentoring both to Individual and specialist development projects. Job Responsibilities Continue Perform Key Management lifecycle activities in line with industry standards and requirements. Design security payment system solutions. Formulate cryptography-related information security standards and review standards on an annual basis, align with and communicate standards to stakeholders, and ensure awareness is created. Periodically monitor conformance to standards and inform stakeholders accordingly. Deploy and maintain cryptography systems in line with the mandated information security standards. Monitor cryptography systems for availability. Perform the role of primary key custodian. Participate in key management duties. Essential Qualifications - NQF Level Advanced Diplomas/National 1st Degrees Essential Certifications CISSP , CISM or relevant qualifications (this is essential certification )Preferred Certifications Security+PKI Cryptography. CISSPPayment Systems Related Minimum Experience Level Minimum of 5 years’ experience PKI Cryptography Security Systems. Exposure to:• PKI• HSMs• Payment Systems Technical / Professional Knowledge Administrative procedures and systems Banking knowledge Data analysis Governance, Risk and Controls Microsoft Office Principles of project management Relevant regulatory knowledge Relevant software and systems knowledge Business writing skills Information Security Threats and Attact vectors Cluster Specific Operational Knowledge System Development Life cycle(SDLC)TCP/IPInformation Security terms and definitions Basic computer concepts Relevant Operating System Information Security policies and procedures Vendor Management Principles Behavioural Competencies Coaching Collaborating Decision Making Influencing Innovation Technical/Professional Knowledge and Skills---------------------------------------------------------------------------------------Please contact the Nedbank Recruiting Team at +27 860 555 566 Explore more Info Sec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.