Chief Information Security Officer
A ZAR 500K-600K (estimate) Executive-level Full Time
Tasks
- Adopt cybersecurity best practices globally
- Create and maintain cybersecurity policy and baseline standards
- Create cybersecurity risk awareness program
- Define and maintain cybersecurity policy
- Deliver information security consultancy to business units
- Develop cybersecurity framework mandate
- Ensure security training program
- Establish cybersecurity governance controls
- Evaluate and mature cybersecurity procedures and capabilities
- Implement access control mechanisms
- Implement group information security policies
- Implement security control mechanisms and reporting
- Integrate security into systems development lifecycle
- Lead cybersecurity change and communication
- Manage cyber information security operations
- Manage cybersecurity budget and costs
- Manage cybersecurity environment with service level agreements
- Manage cybersecurity investigations and breaches
- Monitor access controls and security violations
- Monitor data leakage at gateway and endpoint
- Monitor system logs for threat detection
- Prevent security incidents causing reputational financial loss
- Provide cybersecurity risk assurance to stakeholders
- Provide training and board committee reporting
- Represent company at cybersecurity regulatory bodies
- Review security metrics and reporting
- Support security strategy with cybersecurity products
Perks/Benefits
- N/A
Skills/Tech-stack
Access Control | Access Governance | Cyber Analytics | Cybersecurity | Data Privacy | Development Life Cycle | Endpoint Security | Event management | Fraud investigation | IT Risk | IT Risk Management | Information Security Architecture | Information Security Audit | Information Security Governance | Information security | Mainframe Security | Regulatory Compliance | Risk Assessment | Risk Management | Security Architecture | Security Audit | Security Governance | Security Information | Security Information and Event | Security Information and Event Management | Security Intelligence | Security Policy | Security Risk | Security Risk Management | Security Strategy | Security Threat Analytics | Security analytics | Security investigations | Security operations | Systems Development | Systems Development Life Cycle | Threat Analytics | Threat and Vulnerability | Threat and Vulnerability Assessment | Vulnerability Assessment | Vulnerability Management
Related jobs
-
Data Privacy | Incident Response | Information security | Risk Management | Security ComplianceExecutive-level Full TimeGermiston, GP, South Africa1d ago
-
Budgeting | COBIT | Compliance | Cyber Risk | Cyber Risk ManagementSenior-level Full TimeJohannesburg, GP, South Africa1d ago
-
Business Information Security Officer (BISO) ZAR 420K-560KAccess reviews | Agile | Asset Management | Assurance | CSIRTSenior-level Full TimeBellville, Western Cape, ZA2d ago