The role of IT Risk Manager resides in the Governance, Risk and Business Engagement function that is responsible for Governance and IT Risk Management within the Group. The IT Risk Manager will be actively involved implementing and management of the IT Risk Management Framework and processes for SGT. The IT Risk Manager will be reporting on IT related risks in all the clusters to the Limited Audit & Risk committee. 2nd line Audit & Automating Risk management processes Accurate and effective reporting of IT Risks Develop Reporting
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable or embedding analytics into workflows that reduce risk or power your growth. Clients choose EXL as their at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services services, including Identity and Access Management (IAM), VPC, security groups, and other relevant services such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against successful incumbent will require a suitable Degree/Diploma with 10 years' work experience in a technical hands-on Implement effective security controls to protect against threats. Develop Information Security policies to guide
of backups, recovery procedures, and enforcing security and integrity controls Implementing and administering processes, procedures and operational management associated with system security and disaster recovery planning planning Liaising with security vendors, suppliers, service providers and external resources; analysing, recommending recommending, installing and maintaining software security applications; and monitoring contractual obligations
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Performing network security tasks, including setting up and monitoring of secure voice system networks policies. Managing the access points, IP telephony, PaBX and other hardware set-ups. Managing and expanding OEM Certified as CCNP with Voice / switching and security experience. Minimum of 5 years' relevant working and work as a part of a team. Ability to be self-managed, ethical and honest. Ability to be respectful and
transforming the payment landscape by providing a risk-free and empowering payment solution. Their payment will be doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure operations. Conduct security assessments, including vulnerability testing and risk analyses, to maintain maintain a robust security posture. Monitor and respond proactively to security incidents and alerts, ensuring resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology will you do? The role of IT Risk Administrator resides in the Governance, Risk and Business Engagement function responsible for governance and IT Risk Management within the Company Group. The IT Risk Administrator will be actively involved in supporting IT risk management and Third-Party Risk management activities to support the achievement Implementing & Automating Risk management processes Facilitate Risk Acceptance process – capture,