Role:
The role of IT Risk Manager resides in the Governance, Risk and Business Engagement function
responsible for Governance and IT Risk Management.
The IT Risk Manager will be actively involved
management of the IT Risk Management Framework and processes for our client. The IT Risk Manager will be involved
reporting on IT related risks in all the clusters to the Limited Audit & Risk committee.
Automating Risk management processes
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology
The role of IT Risk Manager resides in the Governance, Risk and Business Engagement function for Governance and IT Risk Management within the Company Group.
The IT Risk Manager will be actively management of the IT Risk Management Framework and processes for Company. The IT Risk Manager will be involved reporting on IT related risks in all the clusters to the Limited Audit & Risk committee.
What
Administrative Coordinator (Security) to perform all administrative duties required by our Security Team. With the the Security Manager, the incumbent will coordinate office operations, projects, and provide administrative Coordinator (Security) will have good communication skills in order to share information with the Security Team with a high level of professionalism and confidentiality. The Administrative Coordinator (Security) will assistance to the Security Team. The Administrative Coordinator (Security) will report to the Security Manager
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities - Monitor Monitor and analyze security trends and incidents to identify areas for improvement - Coordinate with local
looking for a Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing region. The ideal candidate will have experience in security management and knowledge of safety protocols and procedures. Responsibilities: - Develop and implement security and safety protocols to protect sourcing operations Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities - Monitor Monitor and analyze security trends and incidents to identify areas for improvement - Coordinate with local
Cyber and Information Security resilience, and act as technology governance and risk orchestrator for technology will you do? The role of IT Risk Manager resides in the Governance, Risk and Business Engagement function responsible for Governance and IT Risk Management within the Company Group. The IT Risk Manager will be actively management of the IT Risk Management Framework and processes for Company. The IT Risk Manager will be involved reporting on IT related risks in all the clusters to the Limited Audit & Risk committee. What will make
based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools
based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly established change management processes Perform risk assessments and impact analysis for proposed network traffic for security threats and vulnerabilities, and take proactive measures to mitigate risks Work closely
based in Cape Town (CBD) is currently seeking a highly skilled Senior NOC Engineer to join their team ensuring the optimal performance, availability and security of the network infrastructure. The role requires Monitor network performance, availability and security using network monitoring tools Respond promptly established change management processes Perform risk assessments and impact analysis for proposed network traffic for security threats and vulnerabilities, and take proactive measures to mitigate risks Work closely
behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant Certification in risk, information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance Desktop and DLP Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions Third-party Risk management. Conducting Risk assessment and Cloud assurance. Experience in security management