are monitored and managed Providing proactive control design and implementation guidance to the Business Business Monitoring and reporting on Process and Control Compliance Providing management with recommended KRIs Providing management with assurance covering controls across the Business environments that are adequately 8 years' experience in cyber governance, risk, controls, and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam
SQL solutions for monitoring and automation of controls.
SQL solutions for monitoring and automation of controls. Development of exception reports and Power BI routines that maintain reporting and automated controls. Identify and build appropriate models/other solutions facilitate cross system reporting. Automation of controls in the business processes. Design and implement
internationally. Key Responsibilities: Examine internal IT controls, evaluate the design and operational effectiveness application controls. Provide recommendations and guidance on identified security and control risks. Develop
comprehensive audits of IT systems, processes, and controls to ensure compliance with regulatory requirements of IT governance, risk management, and internal control practices.
and other vendor switches, routers, wireless controllers, and VPN • Supporting customers by developing including: routers, switches, wireless access points, controllers, WAN optimizers and monitoring applications in
determine whether the Groups systems of internal controls, risk management and governance, as designed and practices
installation commissioning of CCTV and
years’ experience in cyber governance, risk, controls and compliance management in a technology environment firewalls; VPN technologies, IDS/IPS, network access control and network segmentation, anti-malware and spam being monitored and managed.
Development:
Latest Final Signed off Change Control Policy (not a draft version).
List of changes
Program Library.
Evidence of Automated version control.
Evidence of migration software.
Emergency
rotation and disposal policies.
Environmental controls similar to server room above.
Password Policy
changes.
Separate environments.
Version control.
Change meetings and forum.
IT