The role of IT Risk Manager resides in the Governance, Risk and Business Engagement function that is responsible for Governance and IT Risk Management within the Group. The IT Risk Manager will be actively involved management of the IT Risk Management Framework and processes for SGT. The IT Risk Manager will be involved reporting on IT related risks in all the clusters to the Limited Audit & Risk committee. 2nd line Audit & Automating Risk management processes Accurate and effective reporting of IT Risks Develop Reporting
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
Manager with expertise in Cyber Security to join our team. The successful candidate driving sales, and promoting our Cyber Security solutions.
What you’ll do: do:
The Cyber Security Account Manager plays a pivotal role in fostering strong, long-lasting Vendors, such as Mimecast's email and data security services.
This position focuses on understanding relationships with a portfolio of Mimecast and Cyber Security Clients.
transformation to mitigate and manage the associated risks in regard to IT assets and services. Ensure that reliable, secure, efficient, and scalable. Coordinate with other IT teams and vendors to deliver high-quality Recognised M365 certifications: Microsoft 365 Security Administrator Associate, Identity and Access Administrator
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology Management platforms to ensure stability and continued high performance of said platforms and applications deployed and use proper rules to ensure it is a clean and secure implementation. What will make you successful in and software Financial advice and support System security Advanced analytics to address business requirements
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology Management platforms to ensure stability and continued high performance of said platforms and applications deployed and use proper rules to ensure it is a clean and secure implementation.
What will make you
software
performance tune production databases while ensuring high levels of data availability. This individual is business user needs. Perform database transaction and security audits. Establish appropriate end-user database runstats, backups Responsible to identify and manage risks within your environment. Qualifications Matric Degree issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience vSphere / ESXi Disaster Recovery/Risk Management Firewall / Security Experience Knowledge of Contact Centre
include: Ensuring high levels of performance, availability, sustainability, and security are maintained Maintaining data quality as well as server and database security as per the user privileges set by the business Understanding issues related to network performance and security Refining and automating regular processes Performing supporting .NET (C#, VB, ASP) and VBA applications Have a high level of competency with data extraction, transformation SSDT Have experience defining database server security, user creation, roles, and permissions Have experience
Management platforms to ensure stability and continued high performance of said platforms and applications deployed and use proper rules to ensure it is a clean and secure implementation. The following would assist a successful and software Financial advice and support System security Advanced analytics to address business requirements