Stock Controller? This role might be for you The Risk & internal Audit Clerk will an integral role scheduled timeline. Conduct inventory counts in high-risk areas and oversee the results to ensure compliance Execute internal audit plans designed to identify risks and control weaknesses, ensuring the integrity of driver’s license & own vehicle required The post Risk Controller appeared first on freerecruit.co.za
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology
The role of IT Risk Administrator resides in the Governance, Risk and Business Engagement function responsible for governance and IT Risk Management within the Company Group. The IT Risk Administrator will be actively actively involved in supporting IT risk management and Third-Party Risk management activities to support menting & Automating Risk management processes
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent equivalent are highly desirable Familiarity with industry-specific compliance standards and regulations recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection
similar role, with a proven track record in cloud security
a leading Investment company is searching for a Risk Manager, to provide reliable, value added and independent stakeholders (i.e. regulators) over the effectiveness of risk management within the group of companies which includes improve risk management strategies and processes within group. Plan, execute and manage risk analysis against set parameters. Organise and draft appropriate risk reporting and executive summaries, internally and quantifying risks. Assist management to mitigate exposure to risks to be aligned with the risk appetite
Group's security posture through proactive analysis and mitigation of cyber security threats and risks, especially a team to implement security assessments, measures and processes through security engineering, penetration environment against cyber security threats. JOB OBJECTIVES § Build an application security and penetration testing and manage a team of cyber security specialists in performing security assessments and penetration testing organization's cyber security strategy, policies, processes and tooling for continued security improvements.
Cyber Security Manager to shape, design and manage the implementation of the Group's cyber security strategy Accountable for the organization's cyber security systems and security of infrastructure as well as the organization's types of data breaches. · Assess IT security needs, align cyber security initiatives with business objectives organization's cyber security strategy and roadmap. · Establish and enforce cyber security governance, policies improve cyber security incident response plans, lead and coordinate the response to security incidents,
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology will you do? The role of IT Risk Administrator resides in the Governance, Risk and Business Engagement function responsible for governance and IT Risk Management within the Company Group. The IT Risk Administrator will be actively actively involved in supporting IT risk management and Third-Party Risk management activities to support Implementing & Automating Risk management processes Facilitate Risk Acceptance process – capture,
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent equivalent are highly desirable Familiarity with industry-specific compliance standards and regulations recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection
infrastructure and operations. This role involves conducting risk assessments, planning disaster response activities Knowledge of business continuity planning, risk management, and IT security best practices. • Experience with certifications (e.g., CBCP, MBCI, CISSP, MCSE) are highly desirable. • Fluent in both English and French