regulations, and legislation. Research, anticipate and guard clients against legal risks. Support the Principal agreements, transactions, compliance issues, financial/securities offerings, mergers and acquisitions, and intellectual
regulations, and legislation. Research, anticipate and guard clients against legal risks. Support the Principal agreements, transactions, compliance issues, financial/securities offerings, mergers and acquisitions, and intellectual
managing company policies, particularly those guarding data protection and privacy. Expertly coordinate
managing company policies, particularly those guarding data protection and privacy. Expertly coordinate
execute the function of Internal Auditing. Safe guarding of company assets specifically stock, assets and
cost effective solutions which focuses on safe guarding the project from start, whilst upholding the standards
cost effective solutions which focuses on safe guarding the project from start, whilst upholding the standards
implementation of an organisation-wide information security strategy aligned with the client's business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships. Promotes a culture of security awareness among employees through training, education address and mitigate security incidents. Ensures client's compliance with relevant security regulations, laws
experienced SOC Analyst Level 2 to join their Security Operations Center (SOC) team. The SOC Analyst role in monitoring, analyzing, and responding to security incidents to protect our clients organizational understanding of cybersecurity principles, experience with security tools and technologies, and the ability to work fast-paced environment. Monitor security alerts and events using SIEM (Security Information and Event Management) Management) tools and other security monitoring platforms. Analyze and investigate security incidents to determine
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security. Key Roles and Responsibilities: Proactively monitors information security incidents, Internet use and ICT policy breaches. Administers all security solutions solutions in the Information Security domain including, but not limited to, firewalls, IPS's, VPNs, Mail Gateways Access Control solutions, DNS clusters, Cloud security, mail and domain protection mechanisms such as