desktop support, server support, business systems, security, procurement processes and projectg management
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
managing and controlling all aspects of Risk and Security for the Business within the borders of the designated investigations within the Business. Manage all Security related matters / incidents and ensure compliance compliance with relevant Legislative Acts and Security standards. Effective Management of certain personnel Branches / Sites on the Security processes across the business. Ensure that Security staff have been trained acknowledge by all Security officers. Meetings are held weekly or monthly with the Security service provider
/>covering all new developments in the governance and security space.
Maintain ICT services schedule of
through secure internet gateways
and encryption of electronic data
Manage the secure storage
sector best practice.
Management of personnel security through implementation of "need to
know"
Management of physical security through the use of access control,
security surveillance and alarm
alarm systems as well as secure storage for
assets.
(DESCRIBE TYPICAL EXPERIENCE BACKGROUND): 5 years ICT security experience in a Systems Development Environment
Closing Deals : Negotiate terms with clients to secure sales, addressing any objections or concerns they Configuration: Understanding of LAN/WAN, VPNs, and network security protocols. Server Management : Experience with and Windows server administration. Cybersecurity Security Protocols : Understanding of encryption, firewalls
cloud solutions by implementing and maintaining secure Microsoft cloud storage solutions to ensure excellent
Manage local internet file server
Manage SQL security roles and permissions as required
Create
regulations and best practices Develop and enforce data security protocols Requirements: Degree in Computer Science