The role of IT Risk Manager resides in the Governance, Risk and Business Engagement function that is responsible for Governance and IT Risk Management within the Group. The IT Risk Manager will be actively involved management of the IT Risk Management Framework and processes for SGT. The IT Risk Manager will be involved reporting on IT related risks in all the clusters to the Limited Audit & Risk committee. 2nd line Audit & Automating Risk management processes Accurate and effective reporting of IT Risks Develop Reporting
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems infrastructure; develop Information Security policies & implement effective security controls to protect against Implement effective security controls to protect against threats. Develop Information Security policies to guide and effectively to any security breaches that do occur. Test and evaluate security products to ensure they
financial services industry is looking for a SAP Security Specialist to join their dynamic company. As a permissions) and ECC HR Security Specialist, you will be responsible for providing security support within the permissions of high risk and proactively take action to reduce risk on the systems. Provide SAP Security support reports. Updating of roles/users and understanding risk and impact of changes. Self-driven individual that of remediation. Manage projects within the SAP Security area. Be responsible for coordination and managing
Group's security posture through proactive analysis and mitigation of cyber security threats and risks, especially a team to implement security assessments, measures and processes through security engineering, penetration environment against cyber security threats. JOB OBJECTIVES § Build an application security and penetration testing and manage a team of cyber security specialists in performing security assessments and penetration testing organization's cyber security strategy, policies, processes and tooling for continued security improvements.
Cyber Security Manager to shape, design and manage the implementation of the Group's cyber security strategy Accountable for the organization's cyber security systems and security of infrastructure as well as the organization's types of data breaches. · Assess IT security needs, align cyber security initiatives with business objectives organization's cyber security strategy and roadmap. · Establish and enforce cyber security governance, policies improve cyber security incident response plans, lead and coordinate the response to security incidents,
responsible for keeping our company's and clients' IT secure and compliant by ensuring the reliability and efficiency enabling code to be validated for quality and security and deployed continuously. Responsibilities: Develop Implement and manage security testing tools and processes, including static application security testing (SAST) (SAST), dynamic application security testing (DAST), and container security scanning. Provide guidance and and expertise on system options, risk, impact, and costs vs. benefits. Create and share operational requirements
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
Board meetings to review and assess impact and risks of proposed changes and releases, and manage the releases do not compromise IT security by working closely with the IT security team and coordinating testing legislation in the industry. § Understanding of IT Security principles. JOB-RELATED SKILLS § Excellent written Management § IT Governance Framework Management § IT Risk Management § Scenario Planning and Implementation
performance tune production databases while ensuring high levels of data availability. This individual is business user needs. Perform database transaction and security audits. Establish appropriate end-user database runstats, backups Responsible to identify and manage risks within your environment. Qualifications Matric Degree issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot
reporting