1. Monitor networks and systems for security breaches or intrusions and respond promptly to mitigate risks. 2. Conduct vulnerability assessments and penetration testing to identify security weaknesses and recommend remediation strategies. 3. Develop and implement incident response plans to address security breaches, including containment, eradication, and recovery. 4. Conduct security awareness programs and train employees on cybersecurity best practices and policies. 5. analyse security incidents and conduct forensic investigations to determine the root cause and impact of breaches. 6. collaborate with IT teams to implement security controls and configurations based on risk assessments and industry best practices. 7. research and evaluate emerging cybersecurity threats and vulnerabilities to proactively recommend preventive measures. 8. participate in the development and testing of security protocols, encryption techniques, and access control measures. 9. prepare and present reports to management on cybersecurity posture, incidents, and recommendations for improvement.
1. Execute the processes to enhance operational performance by ensuring accurate and reliable asset information management. 2. Ensure the accuracy and reliability of asset data by regularly maintaining and updating databases. 3. Identify and resolve data discrepancies to uphold the quality of asset information, ensuring data integrity across systems. 4. Work closely with various teams to integrate asset information with other business processes and systems for seamless operations. 5. Offer technical assistance and troubleshoot issues related to asset information systems and tools, ensuring smooth functionality. 6. Assist in preparing and maintaining documentation related to asset information management procedures and standards. 7. Contribute to the development of reports and analyses for internal stakeholders and regulatory bodies.
1. Responsible for developing asset information management strategies that support decision-making and operational performance, ensures data accuracy and reliability through quality assurance, enhances information systems, and integrates them with other business processes 2. Ensures data accuracy and reliability through quality assurance, enhances information systems, and integrates them with other business processes 3. Collaborates with cross-functional teams to optimise asset performance, ensures regulatory compliance, oversees report preparation for regulatory bodies 4. Leads a team of professionals to foster continuous improvement and accountability
1. develop and implement IT compliance policies and procedures based on industry regulations and standards. 2. conduct risk assessments to identify potential compliance issues and vulnerabilities within IT systems and processes. 3. Coordinated and oversee internal and external audits to ensure adherence to IT compliance requirements and standards. 4. develop and conduct training programs to educate employees on IT compliance policies, procedures, and best practices. 5. monitor and enforce compliance with data protection regulations, such as GDPR or CCPA, to protect sensitive information. 6. collaborate with legal and regulatory affairs teams to interpret and implement changes in IT compliance laws and regulations. 7. maintain documentation and records related to IT compliance activities and audit findings. 8. implement controls and measures to mitigate risks associated with IT compliance violations. 9. liaise with external regulators and auditors to address compliance issues and findings. 10. provide guidance and support to IT teams on integrating compliance requirements into system development and operations.
1. Conduct risk assessments and vulnerability scans to identify potential IT security risks and vulnerabilities. 2. Develop and implement strategies and controls to mitigate IT risks, ensuring compliance with industry standards and regulatory requirements. 3. Develop and maintain incident response plans to address IT security breaches and minimise potential damage. 4. Monitor IT systems for security breaches or policy violations, and prepare reports for management detailing risk assessment findings and mitigation activities. 5. evaluate and recommend cybersecurity technologies and tools to enhance IT risk management capabilities. 6. conduct gap analyses to identify deficiencies in existing risk management practices and propose remediation measures. 7. collaborate with legal and compliance teams to ensure IT risk management practices align with legal requirements and contractual obligations. 8. facilitate external audits and assessments to validate the effectiveness of IT risk management controls and procedures. 9. lead incident response exercises and simulations to test the readiness and effectiveness of incident response plans.
1. develop and implement information security strategies and programs to protect organisational data and systems. 2. conduct regular risk assessments and develop risk management plans to mitigate security threats and vulnerabilities. 3. develop and oversee incident response plans and procedures to address security incidents promptly and effectively. 4. ensure compliance with relevant security standards, regulations, and laws through audits, assessments, and continuous monitoring. 5. collaborate with executive management to align information security initiatives with business objectives and priorities. 6. manage and mentor a team of cybersecurity professionals, providing guidance and support in security operations. 7. monitor emerging threats and trends in cybersecurity, implementing proactive measures to safeguard against potential risks. 8. evaluate and recommend security technologies, tools, and solutions to enhance the organisation's security posture. 9. conduct security awareness training and education programs for employees to promote a culture of cybersecurity awareness. 10. prepare and present regular reports on the organisation's security status, incidents, and mitigation efforts.