upholding the highest standards of integrity and security.
Key Responsibilities:
tool
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool
report directly to the OCIO Manager and Risk, Security and Compliance Manager. Based in Cape Town. Requirements: Certification in risk, information systems and/or security desired Skills and exposure to tools such as Outlook current IT security processes and procedures, motivate for process improvements and lead small security initiatives Implementation, support and maintenance of IT security compliancy and monitoring technologies and drive Review IT security standards and policies on effectiveness. Building awareness of security controls,
tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (Min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills: Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance Compliance Cyber Security Monitoring Personal Attributes: Action orientated - Contributing independently Decision
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune Management:
4. Security and Compliance:
production systems. Ensuring availability, performance, security and scalability of AWS production systems. Managing of critical system security by leveraging best practices and prolific cloud security solutions. Providing architecture and process improvements. Implementation of security protocols by evaluating business strategies and