Implement risk management practices ▪ Identify and assess risks within the company environment in collaboration recommendations into the risk management action plan. ▪ Implement the risk awareness plan, as agreed reviewing risk strategies, ensuring alignment line with EPPF objectives. ▪ Maintain and compile a risk register register to inform risk management decisions. ▪ Verify management action plans and follow up on outstanding effectiveness of the Risk Committee and risk champions within the EPPF. ▪ Update the operational risk control matrix
expertise in Quantitative and Qualitative Risk Management?
Do you excel in utilizing
simulations, PERT analyses, and Risk Registers to mitigate project risks effectively? We're searching
Requirements
client is seeking an Operations Manager for Fraud and Risk to be responsible for developing and implementing implementing strategies to mitigate fraud and manage risk within the organisation's operations. This role involves overseeing fraud prevention measures, analysing risk factors, and leading a team to ensure compliance (Fraud and Risk), preferably in the technology or financial services industry.
Job Title: Risk Manager - Mining Location: Gauteng, South Africa Hire Resolve's Client are seeking a a highly skilled and experienced Risk Manager to join our mining team in Gauteng. The ideal candidate candidate will have a strong background in risk management within the mining industry and a proven track record record of identifying, assessing, and mitigating risks to ensure the safety and success of our mining operations Develop and implement risk management strategies to identify, assess, and mitigate risks within the mining
envisaged platform
Technology pitfalls and risks
Vendor offering strategic alignment with builds with the aim to proactively detect issues, risks and/or lack of quality attributes associated with
/>- Design, install and manage security mechanisms that protect the company's network
Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining
Develop and implement standardised Information Security processes and procedures;
- Respond to internal
compliance and correction of all IT security issues;
- Conduct IT risk assessments;
- Assist with
/>- Research, plan, and implement information security technical solutions to meet business requirements
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal
We are looking for a Security Engineer for a company based in Cape Town. This is a remote role. Your guaranteeing that their platforms maintain robust security measures while upholding their scalability and Develop and maintain security features (pentests, firewalls, authentication) Conduct security reviews of software Automate security anomaly detection and alerting Investigate security incidents and innovate security solutions solutions Strong understanding of security risks and mitigations Proficiency in backend development, IP
Electech Power Solutions is looking for a suitable and highly motivated candidate to fill the role of a Cybersecurity Cyber Security Officer to assist in identifying and mitigating security risks, analyzing security data data, and implementing security measures. You will have the opportunity to learn from experienced professionals are to: Assist in monitoring security systems and responding to security incidents. Conduct vulnerability vulnerability assessments and penetration testing. Analyse security data to identify trends and potential threats