awareness, information security management reviews and audits. Develops, reviews and maintains information security University's information security framework. Maintains auditable records and necessary documentation for services awareness of the implication of legislation or other internal and external regulations associated with the effective
utilising your expertise to fill the role of an Audit Account specialist (Pre-sales) sought by a leading solutions. You must ideally have experience in the Audit/GRC software space, experience managing POC activities Tech/ C-level. Ideally have experience in the Audit/GRC software space. Excellent written communication please consider your application unsuccessful. Audit, Account, Specialist, ERP, Pre, sales, JHB, Hybrid
Experience
An International Mining Company has a contract position for a REGIONAL SPECIALIST CHANGE AND
changes comply with internal policies and external regulations.
processes and procedures;
- Respond to internal and external audit findings timeously;
- Group policy
Area
- Ensure IT Services are Accessible to Internal and External Company Customers
- Attend IT
infrastructure.
Asset Management
- Undertake audits of hardware and software assets.
- Conduct
changes comply with internal policies and external regulations.
Maintain audit trails and documentation
outcomes for the business.
Support audits (External and Internal) and reviews including regulatory reviews
actions Tracking and monitoring the implementation of audit remediation actions Designing status reports as Supporting management during audits as well as implementing and tracking management audit actions to closure Providing environment At least 8 years of experience in IT audit and assurance management in a cyber or technology
of POPIA requirements. Understanding of ISA 315 audit requirements. Disaster recovery and business continuity management, access control, vulnerability management, audit log management, email and web browser protections incident response management, and penetration testing. Audit Controls: Enforce information security policies Assessment Ensure compliance with the following audit requirements: Access policies, risk registers, user management, access control, vulnerability management, audit log management, email and web browser protections