policy breaches. Perform proactive vulnerability assessments and assist with managed Security Operations Centre classification and information risk analysis, assessment and acceptance processes. Minimum Requirements
regulatory requirements. Oversees the identification, assessment and management of information security risks security regulations, laws, and industry standards. Assesses and selects appropriate security technologies manages internal and external security audits and assessments. Provides guidance and leadership to the information
Management Perform proactive vulnerability assessments and assist with managed Security Operations Centre classification and information risk analysis, assessment and acceptance processes. Maintains awareness Security Operations Centre tasks and vulnerability assessments. Excellent written and verbal communication
experience as a business analyst involved with assessing, mapping and optimizing business processes. Experience Business Processes. Responsibilities include assessing, analysing, optimising, documenting, implementing
experience as a business analyst involved with assessing, mapping and optimizing business processes. Experience Business Processes. Responsibilities include assessing, analysing, optimising, documenting, implementing
business analysis. Responsibilities include, assessing, analysing, optimising, documenting, implementing experience as a Process Engineer involved with assessing, mapping and optimizing business processes. Experience
track asset and resource allocations Monitor and assess project milestones and operational efficiencies
track asset and resource allocations Monitor and assess project milestones and operational efficiencies
by seeing that security risks are identified, assessed, and accurately reported.
Additionally
directly with the business units to facilitate risk assessment and risk management processes.
by seeing that security risks are identified, assessed, and accurately reported. Additionally, the ISM directly with the business units to facilitate risk assessment and risk management processes. Work closely with and recommend upgrades. Conduct vulnerability assessments to detect current or possible breaches of electronic