Data Operations Team. They are custodian of the Security Master, Benchmark Master and Portfolio Accounting Portfolio Managers, Dealers and Performance and Risk, Client Operations and Reporting teams. Understand benchmark data
Requ
& analysis
in Cape Town . If you have a passion for people, Risk Management, OHS and Training, then this position audits are conducted Recruitment of New Security Officers / Risk Administrators – Interviews to be conducted (Travelling will be required) FF, FA, SHEQ etc. Conduct Security Trainings Schedules candidates / employees into audits are conducted Recruitment of New Security Officers / Risk Administrators – Interviews to be conducted
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology Management platforms to ensure stability and continued high performance of said platforms and applications deployed and use proper rules to ensure it is a clean and secure implementation. What will make you successful in and software Financial advice and support System security Advanced analytics to address business requirements
performance tune production databases while ensuring high levels of data availability. This individual is needs.
performance tune production databases while ensuring high levels of data availability. This individual is needs.
Recognized M365 certifications: Microsoft 365 Security Administrator Associate, Identity and Access Administrator information management policies and processes related to securing data in Microsoft 365 Experience of working in transformation to migrate and manage the associated risks in regard to our IT assets and services, and to responsibilities and the risk for example Cyber Security and Information Security. Continuous Development environment with rapidly changing requirements and a high level of technical skill upkeep and development
Xcede On of our clients are seeking a highly experienced and skilled Senior SQL DBA to join their dynamic ensuring their reliability, performance, and security. Your expertise in MsSQL, SSIS, SSRS, SSAS, and SQL database systems, ensuring high availability, performance, and security. Monitor database performance system performance. Implement and manage database security measures to protect sensitive data. Stay up to recovery strategies. Familiarity with database security and access controls. Excellent problem-solving
incumbent should ideally be somebody with detailed security development and coding skills and also with an Develop and enhance security applications to ensure stability and continued high performance, that includes and use proper rules to ensure it is a clean and secure implementation. Administration, maintenance and developers and IT administrators. Compliance and Risk Management monitoring What will set you up for success Powershell development skills with a focus on Flask IBM Security software Verify Identity and Access manager (ISIM/Verify
responsible for keeping our company's and clients' IT secure and compliant by ensuring the reliability and efficiency enabling code to be validated for quality and security and deployed continuously. Responsibilities: Develop Implement and manage security testing tools and processes, including static application security testing (SAST) (SAST), dynamic application security testing (DAST), and container security scanning. Provide guidance and and expertise on system options, risk, impact, and costs vs. benefits. Create and share operational requirements