Manager: Information Security
Listed on 2026-02-07
-
IT/Tech
Information Security, Cybersecurity, IT Consultant, IT Project Manager
Overview
Title of Position:
Manager:
Information Security
Manager:
Information Security | Post Number: S904
Faculty/Department:
University of the Western Cape -> ICS Department ->
Strategy & Planning
Type of Position:
Permanent - Full Time
Location:
Main Campus - Bellville, WC ZA (Primary)
Closing Date: 9/3/2026
Role Clarification & Key Performance AreasThe University of the Western Cape (UWC) seeks to appoint an experienced Manager:
Information Security in its Information and Communication Services (ICS) department. The University has set itself exciting and challenging goals in its Institutional Operating Plan (IOP), which rely heavily on ICT’s to deliver integrated solutions that enable and support its Academic and Research programs, and its Administrative and Professional Services departments. This permanent position based at the Bellville main campus will report to the Deputy Director: ICT Governance Risk and Compliance and will play a pivotal role in maturing the University’s Information Security (Info Sec) functional domain and capabilities in the areas of Info Sec Governance;
Info Sec Risk;
Info Sec Program Development & Management; and Info Sec Incident Management & Response. This is a demanding but very stimulating role, which requires an experienced individual with the appropriate breadth and depth of business and technical skills and competencies. We invite you to join our team at a very exciting time in the University’s history.
- Key Performance Areas:
- Information Security Governance
- Establish, communicate and maintain information security policies, standards, procedures and other documentation that support information security
- Lead the design and implementation of an information security strategy to proactively address evolving cybersecurity threats and ensuring the confidentiality, integrity and availability of the University's information assets
- Identify current and potential legal and regulatory requirements affecting information security
- Establish reporting and communication channels that support information security
- Information Security Risk Management
- Establish a process for information asset classification and ownership
- Implement a structured information risk assessment mitigation and reporting process, and oversee findings to closure
- Ensure that threat and vulnerability evaluations are performed on an ongoing basis
- Identify and periodically evaluate information security controls and counter-measures to mitigate risk to acceptable levels
- Integrate risk, threat and vulnerability identification and management into operational management and program delivery processes
- Information Security Program Development
- Ensure the development of information security architectures (considering people, information, processes and technology)
- Develop and maintain plans to implement the information security strategy ensuring alignment with other assurance functions
- Specify the activities to be performed within the information security program / projects
- Develop a program for information security awareness, training and education
- Recommend and advise information security requirements into the organization’s processes and life cycle activities (e.g. change control, software development, employment, procurement etc.)
- Advise on the integration of information security controls into contracts
- Establish metrics to evaluate the effectiveness of the information security program
- Information Security Program Management
- Oversee the execution of information security programs
- Oversee the performance of contractually agreed information security controls (e.g., with joint ventures, outsourced providers, business partners, third parties)
- Provide information security advice and guidance (e.g., risk analysis, control selection) across the institution
- Provide information security awareness, training and education to stakeholders (e.g. business process owners)
- Monitor, measure and report on the effectiveness and efficiency of information security controls and compliance with information security policies
- Collaborate with Operational Teams to ensure effective management of controls and the successful implementation of strategies. This includes…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: