...program;
Increased levels of security across designated Business Unit;
Ensure clear lines of communication between business and the Chief Information Security Officer;
Provide reporting on the state and eff...
...operation, support, and maintenance of TraceLink s Information Security Management System (ISMS), certified against ISO 27001 and supporting our... ..., and regulations.
You will perform i...
The Technology Risk Analyst plays a crucial role in identifying, assessing, and mitigating technical risks within an organization. Has an understanding of Enterprise Risk Management practices in a technical environment. This...
...Job Description:
• Designated Information Security Head for the Organization
• Ensuring strategic alignment of information security in support of business objectives
• Direct and support organization in protec...
1. IT cyber security Framework (Policy design and implementation)
Develop policies and framework for maintaining cyber security (for... ...reporting mechanisms for measuring compliance and performan...
What You'll Do
The Cyber Security Authority delivers cyber security activities, aligning global cyber security risk reduction with local market business and technology priorities and in line with the global cyber security strategy to be implement...
Job Responsibilities
Develop, implement, and manage security policies, procedures, framework and plans
Responsible for managing a team... ...etc.
Readiness to work in a 24X7 environment
Certificati...
...candidates who possess well-rounded expertise in security Governance, Risk, and Compliance (GRC).
Roles and Responsibilities... ...alignment with security framework and regulatory requirem...
Job Responsibilities
Develop, implement, and manage security policies, procedures, framework and plans
Responsible for managing a team
Recommend fixes, security patches, and overlook other measures required in the event o...