stock and cash, minimising shrinkage and ensuring a high standard of general housekeeping and administration targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior promotions principles Knowledge of stock, cost, risk and compliance management procedures Knowledge of
day administration. • Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. • Maintains the business-as-usual activities software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication and operate tools for cloud storage management, high availability, cloud migration, and optimization
strategy of the Group thus enabling efficient and secure operations to support business objectives and drive infrastructure, security, and systems administration to ensure high reliability, security, and scalability productivity and satisfaction.
requirement with definite consideration of user and risk impact. End-to-end environment exposure with front-end in Security Domain required. IT Concepts and Architecture. Systems Analysis and Design. Security Concepts (Information Technology Infrastructure Library). Security Domain-related certifications preferable. Job
requirement with definite consideration of user and risk impact. End-to-end environment exposure with front-end in Security Domain required. IT Concepts and Architecture. Systems Analysis and Design. Security Concepts (Information Technology Infrastructure Library). Security Domain-related certifications preferable. Job
environment, in mitigating current and evolving risks across the business. This role will deal with Credit inherent risk and control risk assessments Planning of internal audit assignments per the risk assessment hoc internal audit assignments Walkthroughs Key risk identification Key control identification Key control Knowledge and understanding of Information Security risks e.g., Cyber. Thorough understanding of internal
to ensure that there is a harmonious, safe and secure living environment for all owners, residents and contractors under his/her indirect supervision, such as security and landscaping contractors. The incumbent is expected to : Be friendly and family-oriented with a high level of involvement Be a facilitator, coordinator residential estate To ensure that the estate is safe, secure, protected and maintained for the benefit of the the directors, e.g. refurbishment, maintenance, security contractors, paint contractors, etc. Manage, on
to ensure that there is a harmonious, safe and secure living environment for all owners, residents and contractors under his/her indirect supervision, such as security and landscaping contractors. The incumbent is expected to : Be friendly and family-oriented with a high level of involvement Be a facilitator, coordinator residential estate To ensure that the estate is safe, secure, protected and maintained for the benefit of the the directors, e.g. refurbishment, maintenance, security contractors, paint contractors, etc. Manage, on
realistic yet challenging digital performance targets. Secure executive sponsorship and cross-functional support of progress by advocating for open communication, risk-taking, and experimentation. Identify, in collaboration the customer support process. Risk Management and Compliance Conduct risk assessments, together with the identify potential security, privacy, and compliance issues. Oversee regular security audits and compliance department on legislative compliance, emerging issues, risks and the implementation of changes required on policy
realistic yet challenging digital performance targets. Secure executive sponsorship and cross-functional support of progress by advocating for open communication, risk-taking, and experimentation. Identify, in collaboration the customer support process. Risk Management and Compliance Conduct risk assessments, together with the identify potential security, privacy, and compliance issues. Oversee regular security audits and compliance department on legislative compliance, emerging issues, risks and the implementation of changes required on policy