service levels
FINANCIAL CRIME COMPLIANCE OFFICER AML. The Financial Crime Compliance Officer primary purpose is to assist
Mature Female Professional Candidate required The duties/responsibilities of this position include but are not limited to the following: Client Sales and Services - Answering calls and face to face clients Ordering stock, stationary, etc Stock take Data capturing Maintaining filing system Admi
About the company
SA Youth Development Organisation.
About the role
The COO will oversee daily operations, enhance operational efficiency, optimize business processes, manage financials, drive new business development, handle proposal w
based in Sandton is looking for a dynamic Front Office Administrator to join their team. Responsibilities with all office admin related tasks. Maintaining the CPD register. Requirements 1-2 years of office administration
commercial, contracts, intellectual property, data protection and risk management principles secures This role commercial; contracts, intellectual property, data protection and risk management principles. Experience managing commercial contracts, intellectual property, and data protection. Manage and oversee all legal and risk aspects exposures and ensure the company's interests are protected. Keep abreast of legal and risk management developments
commercial, contracts, intellectual property, data protection and risk management principles secures This role commercial; contracts, intellectual property, data protection and risk management principles. Experience managing commercial contracts, intellectual property, and data protection. Manage and oversee all legal and risk aspects exposures and ensure the company's interests are protected. Keep abreast of legal and risk management developments
commercial; contracts, intellectual property, data protection and risk management principles.
gateways, CASB, authentication and end point protection. Specific responsibilities would include: Administration
Security: Implement robust security measures to protect sensitive data, including access controls, encryption auditing mechanisms, ensuring compliance with data protection regulations. 4. Best Practices Implementation: