according to financial goals. Risk Management: Identifying and mitigating risks associated with the portfolio insurance strategies to protect against potential risks. Work together with our insurance brokers to ensure insurance claims. Security & cameras: Responsible for security and installing of security measures on all all properties. Dealing with security contractors & suppliers in this regard. Regulatory Compliance:
according to financial goals. Risk Management: Identifying and mitigating risks associated with the portfolio insurance strategies to protect against potential risks. Work together with our insurance brokers to ensure insurance claims. Security & cameras: Responsible for security and installing of security measures on all all properties. Dealing with security contractors & suppliers in this regard. Regulatory Compliance:
responsible for keeping our company's and clients' IT secure and compliant by ensuring the reliability and efficiency enabling code to be validated for quality and security and deployed continuously. Responsibilities: Develop Implement and manage security testing tools and processes, including static application security testing (SAST) (SAST), dynamic application security testing (DAST), and container security scanning. Provide guidance and and expertise on system options, risk, impact, and costs vs. benefits. Create and share operational requirements
performance tune production databases while ensuring high levels of data availability. This individual is business user needs. Perform database transaction and security audits. Establish appropriate end-user database stats, backups. Responsible to identify and manage risks within your environment. Qualifications Matric Degree issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot Analysis Database Knowledge Database Security Project Coordination Risk Management Personal Attributes Organisational
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
years of experience in IT especially Self-worker. Highly motivated. Has the trust of his peers. Flexible and troubleshoot any problems as required. Apply security updates and patches where and when required. Create participate in projects in the implementation of security systems and cloud services, Continuous technological or embedding analytics into workflows that reduce risk or power your growth. Clients choose EXL as their years of experience in IT especially Self-worker. Highly motivated. Has the trust of his peers. Flexible
years of experience in IT especially Self-worker. Highly motivated. Has the trust of his peers. Flexible and troubleshoot any problems as required. Apply security updates and patches where and when required. Create participate in projects in the implementation of security systems and cloud services, Continuous technological or embedding analytics into workflows that reduce risk or power your growth. Clients choose EXL as their years of experience in IT especially Self-worker. Highly motivated. Has the trust of his peers. Flexible
Planned Maintenance Execution · Escalate Site Security Incidents and complete required SAPS Case Number Driver's License · First Aid Training · Fire Fighting · Risk Assessment · Working at Heights (Fall Arrest with with Industrial Mobile Generators · High Level Computer literacy · High Level of Relevant Technical literacy
changing conditions Highly desirable: Previous Network segmentation, cyber security experience Previous teams. Change Manager, network segmentation, cyber security, Agile, Jira