Cyber security/Information security value chain . Reporting into the OMF Information Security Risk Manager management. Reporting into the OMF Information Security Risk Manager, this role also provides specialist the effective functioning of OMF's Information Security Management System (ISMS). Assists business unit management strategy, risk policies and information security policies as per the OMF risk requirements. Ensures chain to embed risk management and information security. Challenge management where deemed appropriate
Manager. Compile daily security asset inspection report by obtaining security inspection and distribute Collect all monthly reports from branches (HSE, Security, Fleet, and Consumption). Data capturing of all
Manager. Compile daily security asset inspection report by obtaining security inspection and distribute Collect all monthly reports from branches (HSE, Security, Fleet, and Consumption). Data capturing of all
be driving sales by developing, identifying and securing all relevant direct sales opportunities. At least
systems infrastructure including ensuring systems are secure and protected against cyber threats. You will also and other computer systems. Ensure systems are secure and protected against cyber threats. Install and
Manager. Compile daily security asset inspection report by obtaining security inspection and distribute Collect all monthly reports from branches (HSE, Security, Fleet, and Consumption). Data capturing of all
keeping all systems up to date with patches and security fixes, and helping end-users do their job more long-term fault, configuration, performance and security management of Desktops systems Install, configure Server Administration - Active Directory, Data Security, Group Policies etc. - Installation and troubleshooting
keeping all systems up to date with patches and security fixes, and helping end-users do their job more long-term fault, configuration, performance and security management of Desktops systems Install, configure Server Administration - Active Directory, Data Security, Group Policies etc. - Installation and troubleshooting