(CIA/ITIL/NIST/ISO) Experience with implementing Policies and controls Experience with Cloud computing security developing and implementation of Cybersecurity policies, standards, and guidelines Ability to work with Responsibilities: Develop and Implement Cybersecurity policies, standards, and guidelines Build and manage a technical developments to ensure that cybersecurity policies are in line with these developments and engage volume. Privacy: Data processed as per Privacy Policy. By applying, you agree to data handling. We safeguard
system activity and work with colleagues to agree policies and procedures, for future system enhancements operational work requirements within existing policies, processes and procedures Ensure the stability technologies within existing processes, procedures and policies Ensure User accounts are configured and managed
information security incidents, Internet use and ICT policy breaches Administers all security solutions in Develops, reviews and maintains information security policies and procedures Assists with monitoring, measuring relating to WITS' information security, including policy and procedure, education and awareness, industry
information security incidents, Internet use and ICT policy breaches Administers all security solutions in Develops, reviews and maintains information security policies and procedures Assists with monitoring, measuring relating to WITS' information security, including policy and procedure, education and awareness, industry
(CIA/ITIL/NIST/ISO) Experience with implementing Policies and controls Experience with Cloud computing security developing and implementation of Cybersecurity policies, standards, and guidelines Ability to work with Responsibilities: Develop and Implement Cybersecurity policies, standards, and guidelines Build and manage a technical developments to ensure that cybersecurity policies are in line with these developments and engage volume. Privacy: Data processed as per Privacy Policy. By applying, you agree to data handling. We safeguard
Microsoft Entra Replication. · Management of Group Policy. · Management of Microsoft Entra integration with and policy. · Ensure compliance of all devices against the endpoint and XDR procedure and policy. · Security Security · Third Party access policy. · Perform regular risk assessments. · Address risks identified the policy and procedures for password management. · Create and / or regularly update the policy and operations. · Create and / or regularly update the policy and procedures for mobile computing system usage
and implement change management procedures and policies.
Continuously improve change management processes
Ensure all changes comply with internal policies and external regulations.
Maintain audit
and implement change management procedures and policies.
Ensuring compliance with relevant regulations and policies related to data privacy, security, and access
solutions.
Develop and maintain data governance policies and procedures to ensure data accuracy and integrity