of the Job: Reporting to the Senior Manager: Forensics Investigation, the successful incumbent is responsible responsible for conducting forensics investigations in the respective area into fraudulent matters such as RAF. In addition, the incumbent will provide management advice on internal control weaknesses and improvements improvements. Key Performance Areas Forensic Investigation into Fraud and Related Crimes Assess a matter fraud. Manage the planning and coordination of investigations as assigned by senior management. Manage
of the Job: Reporting to the Senior Manager: Forensics Investigation, the successful incumbent is responsible responsible for conducting forensics investigations in the respective area into fraudulent matters such as RAF. In addition, the incumbent will provide management advice on internal control weaknesses and improvements improvements. Key Performance Areas Forensic Investigation into Fraud and Related Crimes Assess a matter fraud. Manage the planning and coordination of investigations as assigned by senior management. Manage
currently looking for as IT Risk and Compliance manager to manage and implement multiple IT Risk and Compliance Risk Management project experience ensuring compliance and deadlines are met. Internal Security Compliance and Remediation Testing of previously performed Security Assessments and Internal Audits Test the remediation remediation of findings. Confidentiality Management Cyber Security Incident Response Experience and knowledge knowledge of Information Technology and IT Security. Successfully managed and implemented IT Risk and Compliance
of the Job: Reporting to the Senior Manager: Forensics Investigation, the successful incumbent is responsible responsible for conducting forensics investigations in the respective area into fraudulent matters such as RAF. In addition, the incumbent will provide management advice on internal control weaknesses and improvements improvements. Key Performance Areas Forensic Investigation into Fraud and Related Crimes Assess a matter fraud. Manage the planning and coordination of investigations as assigned by senior management. Manage
to clients which includes provisioning, asset management, monitoring, implementation, troubleshooting to: • Operational Support/ Enterprise Services • Managed Services • Professional Services • High level scripting
Urgently looking for a Security Engineer, who not only displays a strong client service orientation but operational, protected and secure through proactively identifying, investigating and resolving technical installed, tested and operational. As well as to Investigate assigned first line support calls and identify service continuity. Must have; CISSP, CCNP / CCIE Security Certified MCSA Certification (advantageous) Experience relevant work experience 2 years’ experience in a Security Engineer role within a large scale (preferably
an IT Security Consultant who is looking to work in a challenging yet rewarding role managing network network security and applications. Duties will include: Management of information Security-related incidents complaints. Working with Qualys Vulnerability Management, Web Application Scanning, and Forti analyzer all Information Security policies and procedures are followed Providing sound security advice to clients clients. Reporting on security incidents and threat outlook Providing report inputs on internal and external
and knowledge in IT Securities. Candidate will be responsible for technical security tools, ensure all Information Security policies and procedures are followed as well as provide sound security advice to our Will also assist with cyber security awareness, deployment of new security solutions Minimum requirements: Degree) CISSP Working with Qualys Vulnerability Management and Web Application Scanning. Must have previously
skilled and experienced Head of Security to oversee all aspects of our security operations. The ideal candidate implementing, and managing comprehensive security strategies to ensure the safety and security of our personnel
a robust and efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses and fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal