company. Our main lines of business are Human Capital Advisory and Recruitment Services in Sub-Saharan make use of such data for the specific purpose of securing you either permanent or temporary employment.
tool
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool
report directly to the OCIO Manager and Risk, Security and Compliance Manager. Based in Cape Town. Requirements: Certification in risk, information systems and/or security desired Skills and exposure to tools such as Outlook current IT security processes and procedures, motivate for process improvements and lead small security initiatives Implementation, support and maintenance of IT security compliancy and monitoring technologies and drive Review IT security standards and policies on effectiveness. Building awareness of security controls,
tool Build strong relationships with Information security teams Assist with enforcing IT risk-related policy either Risk or Security or related IT field (Min NQF 7) Accredited Certification in Risk/Security will be beneficial beneficial Technical experience in the information security domain would be beneficial A minimum of 2 to 5 Skills: Cyber Security Administration Cyber Security Audits Cyber Security Analysis Cyber Security Compliance Compliance Cyber Security Monitoring Personal Attributes: Action orientated - Contributing independently Decision
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune Management:
4. Security and Compliance:
Reference: NFR003717-Abi-1 As the Venture Capital industry continues to grow, new ventures are up for