information security. Key responsibilities: Ensure auditing of security policies and procedures. Update cyber
availability of high-quality knowledge management systems. Act as architect of knowledge identification, capture
availability of high-quality knowledge management systems Act as architect of knowledge identification, capture
access management as per access profile. Ensure auditing of security policies and procedures. Update cyber
forward. The ideal candidate will be very well presented and well-spoken. If you possess a keen eye for
forward. The ideal candidate will be very well presented and well-spoken. If you possess a keen eye for