Cyberteq IT Jobs in Ghana
1. Patiently scroll down and read the job description below.
2. Scroll down and find how to apply or mode of application for this job after the job description.
3. Carefully follow the instructions on how to apply.
4. Always apply for a job by attaching CV with a Cover Letter / Application Letter.
--> Cyberteq is an innovative Information and Communication Technology Consulting Company. In the era of digitalization, we enable our customers to take full advantage of the latest technologies in a secure manner.
Your Responsibilities
- Developing and implementing comprehensive plans to secure information and information systems.
- Analyzing, assessing, and auditing information usage to ensure compliance with recognized security frameworks.
- Develop, plan, and implement security risk assessment.
- Develop and implement security risk treatment plan.
- Lead implementation of security controls to safeguard the information based on recognized security standards.
- Collaborating with management and the IT department to improve security.
- Documenting any security breaches and assessing their damage.
- Develop and provide information security awareness trainings to executive management, senior management, and staff about best practices for information security.
- Develop and implement business continuity management and disaster recovery plans.
ADVERTISEMENT - CONTINUE READING BELOW
1. Patiently scroll down and read the job description below.
2. Scroll down and find how to apply or mode of application for this job after the job description.
3. Carefully follow the instructions on how to apply.
4. Always apply for a job by attaching CV with a Cover Letter / Application Letter.
-->
Cyberteq is an innovative Information and Communication Technology Consulting Company. In the era of digitalization, we enable our customers to take full advantage of the latest technologies in a secure manner.
Your Responsibilities
- Developing and implementing comprehensive plans to secure information and information systems.
- Analyzing, assessing, and auditing information usage to ensure compliance with recognized security frameworks.
- Develop, plan, and implement security risk assessment.
- Develop and implement security risk treatment plan.
- Lead implementation of security controls to safeguard the information based on recognized security standards.
- Collaborating with management and the IT department to improve security.
- Documenting any security breaches and assessing their damage.
- Develop and provide information security awareness trainings to executive management, senior management, and staff about best practices for information security.
- Develop and implement business continuity management and disaster recovery plans.
ADVERTISEMENT - CONTINUE READING BELOW