sales cycle environment for a company selling Security Equipment (Cameras and Alarms) You must be comfortable
and control identification, classification, and risk assessment)
d) Perform compliance audits
f) Create and provide relevant training
2. Secure knowledge
a) Keep abreast of all developments all stakeholders
e) Manage the process of securing and implementing training material
f) Monitor specifically
a) Draft and implement the firms RMCP, Risk Assessments and processes.
b) Manage all
and control identification, classification, and risk assessment) Privacy and data protection (POPIA and regulatory obligations and update the compliance risk management plans d) Perform compliance audits e) firm f) Create and provide relevant training 2. Secure knowledge a) Keep abreast of all developments in changes to all stakeholders e) Manage the process of securing and implementing training material f) Monitor specifically a) Draft and implement the firm's RMCP, Risk Assessments and processes. b) Manage all AML monitoring
and control identification, classification, and risk assessment) Privacy and data protection (POPIA and regulatory obligations and update the compliance risk management plans d) Perform compliance audits e) firm f) Create and provide relevant training 2. Secure knowledge a) Keep abreast of all developments in changes to all stakeholders e) Manage the process of securing and implementing training material f) Monitor specifically a) Draft and implement the firm's RMCP, Risk Assessments and processes. b) Manage all AML monitoring
optimizing internal tools and flows, and ensuring security and processes for development and cloud infrastructure priorities, and workload. Identifies and mitigates risks, making appropriate mid-course corrections. Adheres Generates and maintains high-quality, reusable code. Ensures system security and data safety. Creates Engineers' data structures. Ensures compliance to data security standards. Performs maintenance to ensure data 000 per annum including 13th Cheque, Pension & Risk Benefit Contribution.
looking for a Risk Control Officer in the Pretoria West area. To direct and coordinate all Risk Management the development, implementation and management of Risk Control Programmes in accordance with company standards accountability to legislative requirements are addressed. - a high level of discretion needs to be applied. Legislative Ensure that a site contingency plan is in place. Risk Management Conduct work place and job specific hazard determine the risks associated with these hazards and develop and implement appropriate risk control measures
oversee assessing and comprehending all risk, including the risk of failing to meet regulatory compliance policies, procedures, and internal controls to keep risk at tolerable levels. The ideal Compliance Officer characteristics of the organization and potential compliance risks. Overseeing and monitoring the compliance program's implementation. Preparing and presenting to the Risk and Financial Oversight Committee clear and concise Conducting reviews of existing policies and procedures, risk assessments and providing training and guidance
oversee assessing and comprehending all risk, including the risk of failing to meet regulatory compliance policies, procedures, and internal controls to keep risk at tolerable levels. The ideal Compliance Officer characteristics of the organization and potential compliance risks. Overseeing and monitoring the compliance program's implementation. Preparing and presenting to the Risk and Financial Oversight Committee clear and concise Conducting reviews of existing policies and procedures, risk assessments and providing training and guidance
optimizing internal tools and flows, and ensuring security and processes for development and cloud infrastructure and workload.
IT strategy that incorporates the operational, security and digital strategy through participation in to IT policies and procedures. Implements cyber security resilience aligned to best practices and Bank strategy. 6. Cyber Security Management Develops and implements the cyber security strategy and associated approach towards cyber security threats. Ensures firewalls and other security measures are in place and date. Leads the planning and execution of ongoing security testing and vulnerability assessment. 7. People