>
years’ experience in cyber governance, risk, controls and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam being monitored and managed.
user account lifecycle. Develop and update access control lists. Process security authorization requests security patches and ensuring that proper security controls are present on endpoint resources. Provision and per schedule. Compliance, Governance, Risk and Control Processes: Liaise with Change and Release Management advantageous. Sound knowledge of Information Security controls, concepts, and best practices is required along
IT-risk-based needs and restrictions into technical control requirements and specifications, as well as generate •Proactively monitor systems reports for access control violations/intrusion detection, cybersecurity concerns security risks and controls, as well as discover new risks and suitable controls. •Collaborate with the
Installation and configuration User management MS Domain controller knowledge User administration MS O365 Setup and
experience Experience in financial business or controlling processes Strong knowledge and experience with
including GDPR and POPIA, and be knowledgeable in CIS Controls and NIST Cybersecurity Framework (CSF). Familiarity with industry best practices and frameworks (CIS Controls, NIST CSF). Develop risk mitigation strategies frameworks such as GDPR and POPIA. Understanding of CIS Controls and NIST Cybersecurity Framework (CSF). Familiarity
and controlling work input and scope to ensure that all projects remain on track and in control
and controlling work input and scope to ensure that all projects remain on track and in control Ensuring necessary Report on financial progress on the project, control variances and ensure approvals Following the change
(CIA/ITIL/NIST/ISO) Experience with implementing Policies and controls Experience with Cloud computing security Must threats Establish strong governance and assurance controls and processes to continuously measure and improve improve coverage and operating effectiveness of controls Perform period risk assessments to proactively ensure consistent application of cybersecurity controls across all business processes, projects, and technology threats Establish strong governance and assurance controls and processes to continuously measure and improve