the network. Conduct efficient and effective IT audit procedures. Communicate complex technical issues simplified terms to the relevant staff. Perform regular audit testing and provide recommendations. Review, evaluate Postgraduate qualification 5 years of experience in an audit environment How to Apply: If you meet the above
of POPIA requirements. Understanding of ISA 315 audit requirements. Disaster recovery and business continuity management, access control, vulnerability management, audit log management, email and web browser protections incident response management, and penetration testing. Audit Controls: Enforce information security policies Assessment Ensure compliance with the following audit requirements: Access policies, risk registers, user management, access control, vulnerability management, audit log management, email and web browser protections
with POPIA requirements.
Must know ISA 315 audit requirements.
Disaster recovery and between the Company's auditors and Alice, (auditing tool) this will require reporting all findings between the Company's auditors and Alice, (auditing tool) this will require reporting all findings
logs Liaise with Project Assurance and internal audit Attend to project, system or business assessments Assist Group Finance with financial reporting and IT Audit requirements Education: BCom degree in Information
logs Liaise with Project Assurance and internal audit Attend to project, system or business assessments Assist Group Finance with financial reporting and IT Audit requirements Education: BCom degree in Information
testing/parallel runs System implementation System audits/quality assurance Penetration Test Requirements:
Facilitating input from other infrastructure areas Getting audit buy-in and sign-off to proposed regulatory treatment
Facilitating input from other infrastructure areas Getting audit buy-in and sign-off to proposed regulatory treatment
support, ensuring system security, and conducting audits. You will also be expected to contribute to improve
to relevant legislation. Facilitates IT security audits or investigations. Identify and escalate risks