guidelines, taking cognisance of performance, security and scalability requirements. Deliver within agreed
technologies are used efficiently, profitably and securely.
shared services, ensure Cyber and Information Security resilience, and act as technology governance and
shared services, ensure Cyber and Information Security resilience, and act as technology governance and
meetings · Coordinate external contractors · Manage security vulnerabilities WHAT DO WE OFFER YOU? · Cutting
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders
and error correction, processing rules, access, security, audit controls, recovery routines and contingency
and error correction, processing rules, access, security, audit controls, recovery routines and contingency
systems and software continuously. Conducting security checks and audits on the product. Ensuring the
Coordinate external contractors
· Manage security vulnerabilities
WHAT DO WE OFFER