with safety and security legislation, coordinate and promote the health, safety and security of employees employees on security protocols, procedures and systems. · Ensure Internal and External Security Coordination Coordination · Facilitate Security Management · Conduct Security inspections and investigations · Provide infrastructure infrastructure and facilities security · Ensure effective security management · Coordinate People and Stakeholder Diploma (NQF Level 6) in Security management / or related field in security · A Bachelor's degree will
with safety and security legislation, coordinate and promote the health, safety and security of employees employees on security protocols, procedures and systems. · Ensure Internal and External Security Coordination Coordination · Facilitate Security Management · Conduct Security inspections and investigations · Provide infrastructure infrastructure and facilities security · Ensure effective security management · Coordinate People and Stakeholder Diploma (NQF Level 6) in Security management / or related field in security · A Bachelor's degree will
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
is to plan, manage, and administer the network security. Ensure all network components are managed in Information Security Specialist, you will be responsible to: Design, install and manage security mechanisms Upgrade systems by implementing and maintaining security controls; • Protect the system by defining access Develop and implement standardised Information Security processes and procedures; • Respond to internal compliance and correction of all IT security issues; • Conduct IT risk assessments; • Assist with Penetration
oversee assessing and comprehending all risk, including the risk of failing to meet regulatory compliance policies, procedures, and internal controls to keep risk at tolerable levels. The ideal Compliance Officer characteristics of the organization and potential compliance risks. Overseeing and monitoring the compliance program's implementation. Preparing and presenting to the Risk and Financial Oversight Committee clear and concise Conducting reviews of existing policies and procedures, risk assessments and providing training and guidance
oversee assessing and comprehending all risk, including the risk of failing to meet regulatory compliance policies, procedures, and internal controls to keep risk at tolerable levels. The ideal Compliance Officer characteristics of the organization and potential compliance risks. Overseeing and monitoring the compliance program's implementation. Preparing and presenting to the Risk and Financial Oversight Committee clear and concise Conducting reviews of existing policies and procedures, risk assessments and providing training and guidance
to join their team. Department: Foreclosure and Secured Aset Department Minimum Requirements: Minimum 8 years post admission experience, s pecialising in High Court Banking Litigation with specific focus on asset finance matters Admitted attorney Possess high court litigation experience Possess a valid driver's to join their team. Department: Foreclosure and Secured Aset Department Minimum Requirements: Minimum 8 years post admission experience, s pecialising in High Court Banking Litigation with specific focus on
to join their team. Department: Foreclosure and Secured Aset Department Minimum Requirements: Minimum 8 years post admission experience, s pecialising in High Court Banking Litigation with specific focus on asset finance matters Admitted attorney Possess high court litigation experience Possess a valid driver's to join their team. Department: Foreclosure and Secured Aset Department Minimum Requirements: Minimum 8 years post admission experience, s pecialising in High Court Banking Litigation with specific focus on
day administration. Manages the installation, securing, repair/troubleshooting and maintenance of LAN overseeing the implementation of data and network security. Maintains the business-as-usual activities around software applications for performance, integrity, and security in accordance with relevant compliance policies firewall, database, identity, monitoring, backup, security, project management, architecture, and communication and operate tools for cloud storage management, high availability, cloud migration, and optimization
create a register of reports and escalate persistent risk. Create logs and follow up on logs with card data bonus. An understanding of modern information security methodologies and standards, especially in a Hybrid