with IT policies and procedures Experienced with Annual reviews and signing off of policies. Ability Ability to add new policies as needed. Knowledge of POPIA requirements. Understanding of ISA 315 audit requirements to Programs & Data: Implement and maintain policies and procedures for accountability, identity, authorization data. Change Management: Establish and manage policies and procedures for change requests, tracking changes Audit Controls: Enforce information security policies, organization information security, human resource
external audit findings timeously;
- Group policy management;
- Ensure Endpoint protection (Antivirus
Information System compliance and conformance to IT policies and processes;
- Ensure that systems and
information security incidents, Internet use, and ICT policy breaches.
Skills & Knowledge
Vulnerability management.
- Knowledge of Group Policy Management and Firewalls (Checkpoint, Sophos);
(CIA/ITIL/NIST/ISO).
Develop and Implement Cybersecurity policies, standards, and guidelines. Build and manage
technical developments to ensure that cybersecurity policies are in line with these developments and engage
information security incidents, Internet use and ICT policy breaches. Perform proactive vulnerability assessments Develops, reviews and maintains information security policies and procedures. Maintains awareness of the implication
performance data and industry developments Budgeting, Policies and Procedures Development Collaborate with finance financial guidelines. Develop and enforce DevOps policies and procedures to ensure consistency and compliance within the business. Regularly review and update policies to align with industry best practices and organizational financial guidelines. Develop and enforce DevOps policies and procedures to ensure consistency and compliance compliance. Regularly review and update policies to align with industry best practices and organizational
processes; systems and policies and support implementation of new processes; policies and systems. Enable equipment. Ensure compliance to relevant standards and policies by preparing and maintaining operational documentation systems development and service delivery staff on policies; procedures and standards Ensure smooth workflow
processes; systems and policies and support implementation of new processes; policies and systems. Enable equipment. Ensure compliance to relevant standards and policies by preparing and maintaining operational documentation systems development and service delivery staff on policies; procedures and standards Ensure smooth workflow
managing Active Directory, DNS/DHCP, and group policies
information security incidents, Internet use and ICT policy breaches.
information security incidents, Internet use and ICT policy breaches. Administers all security solutions in Develops, reviews and maintains information security policies and procedures. Assists with monitoring, measuring issues relating to information security, including policy and procedure, education and awareness, industry