the work and overall performance of regional protection services technology systems for all mining operations
relating to the protection services environment.
Manage costs associated with the protection services transparently
protection services vendors, with input from the regions
protection services management systems, including video
and implementing integration between different protection services management systems and other enterprise
experience in a real-world setting. You will work closely with our seasoned cybersecurity professionals on development and implementation of security measures to protect information systems and networks. - Conduct vulnerability
the Financial Market Act to mitigate risks and protect the companys reputation and integrity
requirements to successful rollout.
from requirements to successful rollout. Work closely with national and international specialist areas levels of test automation. Ensure compliance, data protection, and IT security requirements, and enforce uniform
their dynamic Cybersecurity team and assist in protecting the Oganization's digital assets from cyber threats detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management
Interest, Code of Conduct, ABAB Awareness, Data Protection) Forwarding of all received product quality complaints received will be processed in accordance with The Protection of Personal Information Act No. 4 OF 2013
systems' maturity and resilience posture for protecting customer s and Phakamo s digital assets. Key security incident and event management, data protection (DLP, encryption), user and administrator account following areas: Identity and access Platform protection Security operations Data security Application Administrator Associate Microsoft Certified: Information Protection and Compliance Administrator Associate Two of
gateways, CASB, authentication and end point protection. Specific responsibilities would include: Administration
existing systems. Implement security and data protection solutions. Assess and prioritize feature requests