system activity and work with colleagues to agree policies and procedures, for future system enhancements operational work requirements within existing policies, processes and procedures Ensure the stability technologies within existing processes, procedures and policies Ensure User accounts are configured and managed
information security incidents, Internet use and ICT policy breaches Administers all security solutions in Develops, reviews and maintains information security policies and procedures Assists with monitoring, measuring relating to WITS' information security, including policy and procedure, education and awareness, industry
information security incidents, Internet use and ICT policy breaches Administers all security solutions in Develops, reviews and maintains information security policies and procedures Assists with monitoring, measuring relating to WITS' information security, including policy and procedure, education and awareness, industry
(CIA/ITIL/NIST/ISO) Experience with implementing Policies and controls Experience with Cloud computing security developing and implementation of Cybersecurity policies, standards, and guidelines Ability to work with Responsibilities: Develop and Implement Cybersecurity policies, standards, and guidelines Build and manage a technical developments to ensure that cybersecurity policies are in line with these developments and engage volume. Privacy: Data processed as per Privacy Policy. By applying, you agree to data handling. We safeguard
Department to implement and understand sourcing policies and guide the business Onboarding of suppliers
Department to implement and understand sourcing policies and guide the business Onboarding of suppliers
data lineage, and implementing data governance policies on AWS. Requirements: Minimum of 5 years of experience
Microsoft Entra Replication. · Management of Group Policy. · Management of Microsoft Entra integration with and policy. · Ensure compliance of all devices against the endpoint and XDR procedure and policy. · Security Security · Third Party access policy. · Perform regular risk assessments. · Address risks identified the policy and procedures for password management. · Create and / or regularly update the policy and operations. · Create and / or regularly update the policy and procedures for mobile computing system usage
ensuring compliance with specified legislation, SHE policies and procedures and, operational standards, instructions prescribed regulations, standards and internal policies and procedures
and implement change management procedures and policies.
Continuously improve change management processes
Ensure all changes comply with internal policies and external regulations.
Maintain audit