My client is seeking a seasoned Solutions Architect with integrations and systems experience to develop high-level roadmap for the implementation of the solution.
high-level roadmap for the implementation of the solution Matrix manages Architects delivering on projects/initiatives cooperation with the Product Manager, the Senior Solution Architect plays a critical role in helping align
client is seeking an Operations Manager for Fraud and Risk to be responsible for developing and implementing implementing strategies to mitigate fraud and manage risk within the organisation's operations. This role involves overseeing fraud prevention measures, analysing risk factors, and leading a team to ensure compliance and implement corrective action plans to mitigate risks identified during audits. Fraud Operations: Lead and implement measures to minimize refund-related risks. Reconciliation: Oversee reconciliation processes
client is seeking an Operations Manager for Fraud and Risk to be responsible for developing and implementing implementing strategies to mitigate fraud and manage risk within the organisation's operations. This role involves overseeing fraud prevention measures, analysing risk factors, and leading a team to ensure compliance (Fraud and Risk), preferably in the technology or financial services industry.
Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to company Cyber Security Strategy across the company entity. Achieve and maintain and target Cyber Security Maturity cyber programmes Design, Develop and Implement a Security Programme for company No or per target Internal findings related to company for Cyber Security Ensure a Cyber Security Incident Response Practice is in place
for a professional Principal Specialist: Cyber Security contract role for 12 months. Desirable: An industry and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. At At least 8 years' experience in cyber governance, risk, controls, and compliance management in a technology Industry (PCI)/Data Security Standard. High level understanding and Knowledge of Cloud Risk, Compliance and operating multiple security programs, projects, and initiatives and related security tooling An ability
3-to-5-year cyber security strategy across the company Achieve and maintain and target cyber security maturity programmers. Support the design, develop and implement a security programmer for the company No or per target Internal findings related to the company for cyber security Ensure a cyber security incident response practice is in place place across the company Promote awareness of security policies, training, and the governance strategy sound security governance is reflected across the entity Actively manage risks on the Cyber Risk Register
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal
plan, manage, and administer the company network security. Ensure all network components are managed in experience in IT governance and security. Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Directory. Knowledge of Cloud Security. Design, install and manage security mechanisms that protect the Upgrade systems by implementing and maintaining security controls. Protect the system by defining access Develop and implement standardised Information Security processes and procedures. Respond to internal