with IT policies and procedures Experienced with Annual reviews and signing off of policies. Ability Ability to add new policies as needed. Knowledge of POPIA requirements. Understanding of ISA 315 audit requirements to Programs & Data: Implement and maintain policies and procedures for accountability, identity, authorization data. Change Management: Establish and manage policies and procedures for change requests, tracking changes Audit Controls: Enforce information security policies, organization information security, human resource
performance data and industry developments Budgeting, Policies and Procedures Development Collaborate with finance financial guidelines. Develop and enforce DevOps policies and procedures to ensure consistency and compliance within the business. Regularly review and update policies to align with industry best practices and organizational financial guidelines. Develop and enforce DevOps policies and procedures to ensure consistency and compliance compliance. Regularly review and update policies to align with industry best practices and organizational
standards of operations, designing, and enforcing policies & procedures to protect the computing infrastructure Oracle Fusion Cloud Developing information security policies and procedures. Cybersecurity event detection
data governance policies. • Enforcing the Data Management and Data Breach Prevention Policy. • Report findings
VPN/Routing/Firewall Policy/DHCP setup and maintenance Mikrotik Routerboard/CHR IPSec/Routing/Firewall Policy setup management / manage call recordings Cloudflare DNS / policy and rule management VOIP Phone / Microsip setup
VPN/Routing/Firewall Policy/DHCP setup and maintenance • Mikrotik Routerboard/CHR IPSec/Routing/Firewall Policy setup management / manage call recordings • Cloudflare DNS / policy and rule management • VOIP Phone / Microsip setup
Department to implement and understand sourcing policies and guide the business Onboarding of suppliers
Department to implement and understand sourcing policies and guide the business Onboarding of suppliers
structured work environment. Flexible, but sound code policies and methods. Communication and systems are streamlined structured work environment. Flexible, but sound code policies and methods. Communication and systems are streamlined
todata governance policies. Enforcing the Data Management and Data Breach Prevention Policy. Report findings