SQL solutions for monitoring and automation of controls. Development of exception reports and Power BI routines that maintain reporting and automated controls. Identify and build appropriate models/other solutions solutions for use in the company's operations. Creating logic links between data from various systems facilitate cross system reporting. Automation of controls in the business processes. Design and implement
IT-risk-based needs and restrictions into technical control requirements and specifications, as well as generate performance and management. •Coordinates technical operations within the IT organisation to develop and manage status and service-level reports. Strategic & Operational Support: •Develop, implement and monitor a strategic •Proactively monitor systems reports for access control violations/intrusion detection, cybersecurity concerns security risks and controls, as well as discover new risks and suitable controls. •Collaborate with the
maintain security controls in accordance with industry best practices, such as access control lists, encryption is considered in every aspect of the company's operations from product development to customer service configuration, identify management and access control, firewall management, auditing and monitoring, administrator account management, SSO, conditional access controls and password/key management. Documenting platform Governance and Risk Compliance (GRC) Security operations Security posture management Must have experience
The successful candidate will work with the operations department and will have a minimum of 5 years' SQL, HDML, Linux, KAN Familiarity with version control systems and agile development processes. Bachelor
creating a company that dominates the segment and controls the township connectivity ecosystem. We're looking utilization of the space • Manage the stock control operations with warehouse staff, as well as the finance strive for continuous improvement of the stock control function •Identifying bottlenecks and initiating preventative measures, including introducing internal controls. Degree/Diploma in Logistics, supply chain management
setups and scheduled maintenance including server room checks, air con checks, drive checks and battery
completeness of all data master files Performing the operational establishment and preventive maintenance of backups procedures, and enforcing security and integrity controls Implementing and administering database documentation responsibility for the processes, procedures and operational management associated with system security and and instructions, and recording and detailing operational procedures and system logs Ensuring that the
adherence to standards, procedures and quality control issues and activities Assisting in troubleshooting guidance and training in application software and operational procedures Analysing, evaluating and diagnosing hardware, printers, Internet, email, databases, operating systems and security systems Testing, identifying documentation such as procedural, instructional and operational guides and manuals, technical reports and specifications
Manager will be responsible for ensuring the smooth operation of our IT systems, implementing technology solutions to drive innovation and efficiency in our IT operations. IT Infrastructure Management and End User support: scalability of IT infrastructure to support business operations and compliance requirements. Manage relationships continuity plans to mitigate risks and ensure operational resilience. IT Security and Compliance: Develop enforce IT security policies, procedures, and controls to protect sensitive data and mitigate cybersecurity
150 000.00 Annually CTC Permanent A retailer operating in the travel retail sector is looking for a professional (CIA/ITIL/NIST/ISO) Experience with implementing Policies and controls Experience with Cloud computing security Must assurance controls and processes to continuously measure and improve coverage and operating effectiveness effectiveness of controls Perform period risk assessments to proactively identity and mitigate cyber risks Engage ensure consistent application of cybersecurity controls across all business processes, projects, and technology