are monitored and managed Providing proactive control design and implementation guidance to the Business Business Monitoring and reporting on Process and Control Compliance Providing management with recommended KRIs Providing management with assurance covering controls across the Business environments that are adequately 8 years' experience in cyber governance, risk, controls, and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam
are monitored and managed Providing proactive control design and implementation guidance to the Business Business Monitoring and reporting on Process and Control Compliance Providing management with recommended KRIs Providing management with assurance covering controls across the Business environments that are adequately 5 years' experience in cyber governance, risk, controls, and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam
SQL solutions for monitoring and automation of controls.
SQL solutions for monitoring and automation of controls. Development of exception reports and Power BI routines that maintain reporting and automated controls. Identify and build appropriate models/other solutions facilitate cross system reporting. Automation of controls in the business processes. Design and implement
Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that
solutions for detonator related products, specifically control equipment and test equipment. Provide software solutions to facilitate the design and deployment of control equipment that will enable the organisation to embedded platforms Familiarity with software revision control systems and code review techniques The following
various environments.
and other vendor switches, routers, wireless controllers, and VPN • Supporting customers by developing including: routers, switches, wireless access points, controllers, WAN optimizers and monitoring applications in
determine whether the Groups systems of internal controls, risk management and governance, as designed and practices
Responsibilities: Analyze information to identify security control and/or capability gaps that impacts the organization's remediation of vulnerabilities Enhance the current controls and oversight of the various compute environments Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that