are monitored and managed Providing proactive control design and implementation guidance to the Business Business Monitoring and reporting on Process and Control Compliance Providing management with recommended KRIs Providing management with assurance covering controls across the Business environments that are adequately 5 years' experience in cyber governance, risk, controls, and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam
Budget and Financial Controls:
plan
Role Chara
Infrastructure security architectures, vulnerabilities and controls including Active Directory, Azure Active Directory Testing and/or simulating of security events for controlled testing and validating of infrastructure and articulate vulnerabilities, defects, technical controls and risks, with the Business in a manner that
5 years' experience in cyber governance, risk, controls and compliance management in a technology environment Proactive Control design and implementation guidance provided to the Business. Process and Control Compliance
regulations by providing policies, procedures, controls and standards Support the Implementation, support effectiveness. Building awareness of security controls, procedures, policies and best practices. Work Document network, system, and application user access control procedures and update policies and processes as
5 years' experience in cyber governance, risk, controls and compliance management in a technology environment Proactive Control design and implementation guidance provided to the Business. Process and Control Compliance
solutions for detonator related products, specifically control equipment and test equipment. Provide software solutions to facilitate the design and deployment of control equipment that will enable the organisation to embedded platforms Familiarity with software revision control systems and code review techniques The following
Privileged Account Management process Network Access Control - process and exception handling Vulnerability to report on the status of the cyber security control environments on a weekly, monthly and quarterly effectiveness and efficiency of monitoring and response controls. The consultant will contribute to Knowledge