support, business systems, security, procurement processes and projectg management. Minimum 5 years at specialist
Operational Risk Analyst, with a shield of experience in managing and monitoring operational and IT risks? If organization from risks. Skills & Experience: A minimum of 3-5 years of experience in managing and monitoring monitoring operational risk, including IT risks, or the superpower to challenge IT risks. This isn't about Avengers, we need you to take on enterprise risks Experience in risk governance is a considerable advantage communication skills with the ability to articulate complex risk issues clearly. It's the "I can do this all day"
years of experience in managing and monitoring operational risk, including IT risks, or the superpower to
to challenge IT risks. This isn't about strength, it's about courage
Experience in the financial
we need you to take on enterprise risks
Experience in risk governance is a considerable advantage
communication skills with the ability to articulate complex risk issues clearly. It's the "I can do this
Responsible for maintaining acceptable levels of ICT Risk, executing and overseeing implementation projects expectations, and applicable legislation. Effecting ICT Risk mitigation strategies based on contemporary research audit engagements, practical effectiveness through managing sub-projects, working with all stakeholders through cORCM and Prince 2 Certification in Project Management
1.
Strategy
on project progress against deliverables
Management of all compliance with applicable legislation
JOB PURPOSE Implement and manage security controls to prevent unauthorised access to FIC data and infrastructure infrastructure and to protect against Cyber Security threats and attacks. KEY PERFORMANCE AREAS: • Conduct Technology) security controls consistent with policies are in place for each system. • Advocating security and and security practices throughout the organisation. • Provide input into drafting and implementing security Assist in planning and testing upgrades on all security-related infrastructure. • Participate in penetration
Position: Cyber Security Engineer Hire Resolves client is seeking a highly skilled and experienced Cyber Cyber Security Engineer to join their team in Middelburg, Mpumalanga. The successful candidate will be responsible for monitoring, assessing, and implementing security measures to protect their organisation's systems maintain security measures to protect computer systems, networks, and data Conduct regular security audits monitor security systems, and investigate security breaches Develop and implement security policies
Your Purpose: Join the team as a Security Engineer within the IT Security Services division, where your In this role, you'll oversee the response to security incidents, conduct thorough investigations, implement professionalism. Understanding and addressing complex security requirements will be a significant part of your systems or networks. Your adeptness in project management and administration will be essential as you navigate your role. Moreover, you'll take ownership of security technology implementations, maintenance, and operations
space is seeking the expertise of a Microsoft Security & Firewalls Specialist to join their company >
development. An exciting opportunity exists for an IT Security Operations Engineer at AVI Limited IT Shared Services Apply technical IT Security Infrastructure expertise and tools to ensure the security of AVI IT operations supporting infrastructure Implement, Manage, Maintain and Administer AVI's Security Infrastructure and Systems Systems Implement and optimise tools to effectively manage and monitor infrastructure and provide effective effective alerting and reporting with regards to security incidents and vulnerability assessments Play lead role
seeking a highly skilled and experienced Cloud Security Engineer to join our team on a full-time basis responsible for designing, implementing, and maintaining secure cloud environments for our clients. This role requires requires a deep understanding of cloud security best practices and a strong background in cloud infrastructure infrastructure and architecture. 1. Cloud Security Focus Develop and execute the Cloud technology roadmap with cloud and cloud security technologies. Engage with business units to ensure secure Cloud deployments