network security concepts.
and/or architecture principles. Perform technical assessments of new and proposed technologies, products and points or success criteria for assessments and or proof of concepts. Assess and articulate proof of concept architectures to relevant stakeholders Provide an assessment, review, recommendation and or opinion of Solution technologies, products, methods and techniques and the assessment of their relevance and potential value to the of individual and combined benefits. Solution Assessment • Understands the design principles in the vendor's
and/or architecture principles. Perform technical assessments of new and proposed technologies, products and points or success criteria for assessments and or proof of concepts. Assess and articulate proof of concept architectures to relevant stakeholders Provide an assessment, review, recommendation and or opinion of Solution technologies, products, methods and techniques and the assessment of their relevance and potential value to the of individual and combined benefits. Solution Assessment • Understands the design principles in the vendor's
fundamental network security concepts. Vulnerability Assessment and Penetration Testing: Proficiency in identifying penetration testing, and comprehensive vulnerability assessments. Secure Coding Practices: Familiarity with secure Knowledgeable about risk assessment methodologies and the ability to assess and mitigate cybersecurity
technology implementations
and complete workplace and job activity risk assessments and safety inspections Accept responsibility Security Group, amongst others, is monitored, assessed and the necessary feedback is given for corrective
and complete workplace and job activity risk assessments and safety inspections Accept responsibility Security Group, amongst others, is monitored, assessed and the necessary feedback is given for corrective
for new technology implementations Monitor and assess current and future technologies and provide advice framework that maximises value for the enterprise Assess and communicate risks associated with information
effectiveness of controls.
Perform period risk assessments to proactively identity and mitigate cyber risks including regulatory reviews.
Conduct Security assessment.
Development of educational programs in
SAP functions. Key performance areas: Identify, assess and resolve issues/problems within own area of workstations and work sites to identify issues, assess usage and to promote the solutions and good practice