telephonically. IT Desktop and Technical Support Investigating desktop related incidents. Working with OS platforms escalated timeously to all the relevant parties. Investigating and analysing root causes as well as problem re-assign it to the applicable area for further investigation and resolution. Escalating to management in
business being handled.
Technical
notification and Investigation Claims notification and investigation
party subpoenas
actions against both external and internal risks. Investigate security breaches and take steps to mitigate procedures and protocols. Optimise InfoSec systems. Investigate innovative technical solutions and security tools
Reference architecture Perform research and investigations Deviation management New concepts Validate Reference architecture Perform research and investigations Deviation management New concepts Validate
Detail variances & unresolved queries to be investigated Daily redeems of crates & pallets. Resolving check list Weekly Clover / SAP variances to be investigated and reported Assist with other duties as required
Detail variances & unresolved queries to be investigated Daily redeems of crates & pallets. Resolving check list Weekly Clover / SAP variances to be investigated and reported Assist with other duties as required
health and safety inspections and/or incident investigations. Emergency Preparedness Ensure that fire prevention are maintained. I ncident Investigations Conduct post incident investigations in order to identify root
health and safety inspections and/or incident investigations. Emergency Preparedness Ensure that fire prevention are maintained. I ncident Investigations Conduct post incident investigations in order to identify root
with internal stakeholders, including fraud investigators, risk managers, IT teams, and legal counsel to identify potential fraudulent activities. Investigating suspicious transactions or activities flagged legitimacy of transactions. Collaborating with fraud investigators and forensic analysts to assess fraud risks with internal stakeholders, including fraud investigators, risk managers, IT teams, and legal counsel