1. Responsible for the operation, support, and maintenance of specific software applications, which may be built in-house or third-party software. 2. Has a deep understanding of the application's functionality and backend. 3. Oversees software testing and transition processes and provides necessary support when required. 4. Responsible for interacting with the application users and setting up, and onboarding of the users. 5. Works in a team setting and is proficient in applications development and monitoring tools and techniques required by the organisation. 6. Familiar with the relevant software platforms on which the solutions are deployed. 7. Uses critical thinking skills to identify and solve problems. 8. Passionate about analysing and resolving problems, and addressing technical challenges. 9. Possesses strong interpersonal skills.
1. Monitor networks and systems for security breaches or intrusions and respond promptly to mitigate risks. 2. Conduct vulnerability assessments and penetration testing to identify security weaknesses and recommend remediation strategies. 3. Develop and implement incident response plans to address security breaches, including containment, eradication, and recovery. 4. Conduct security awareness programs and train employees on cybersecurity best practices and policies. 5. analyse security incidents and conduct forensic investigations to determine the root cause and impact of breaches. 6. collaborate with IT teams to implement security controls and configurations based on risk assessments and industry best practices. 7. research and evaluate emerging cybersecurity threats and vulnerabilities to proactively recommend preventive measures. 8. participate in the development and testing of security protocols, encryption techniques, and access control measures. 9. prepare and present reports to management on cybersecurity posture, incidents, and recommendations for improvement.
1. develop and implement IT compliance policies and procedures based on industry regulations and standards. 2. conduct risk assessments to identify potential compliance issues and vulnerabilities within IT systems and processes. 3. Coordinated and oversee internal and external audits to ensure adherence to IT compliance requirements and standards. 4. develop and conduct training programs to educate employees on IT compliance policies, procedures, and best practices. 5. monitor and enforce compliance with data protection regulations, such as GDPR or CCPA, to protect sensitive information. 6. collaborate with legal and regulatory affairs teams to interpret and implement changes in IT compliance laws and regulations. 7. maintain documentation and records related to IT compliance activities and audit findings. 8. implement controls and measures to mitigate risks associated with IT compliance violations. 9. liaise with external regulators and auditors to address compliance issues and findings. 10. provide guidance and support to IT teams on integrating compliance requirements into system development and operations.
1. Conduct risk assessments and vulnerability scans to identify potential IT security risks and vulnerabilities. 2. Develop and implement strategies and controls to mitigate IT risks, ensuring compliance with industry standards and regulatory requirements. 3. Develop and maintain incident response plans to address IT security breaches and minimise potential damage. 4. Monitor IT systems for security breaches or policy violations, and prepare reports for management detailing risk assessment findings and mitigation activities. 5. evaluate and recommend cybersecurity technologies and tools to enhance IT risk management capabilities. 6. conduct gap analyses to identify deficiencies in existing risk management practices and propose remediation measures. 7. collaborate with legal and compliance teams to ensure IT risk management practices align with legal requirements and contractual obligations. 8. facilitate external audits and assessments to validate the effectiveness of IT risk management controls and procedures. 9. lead incident response exercises and simulations to test the readiness and effectiveness of incident response plans.
1. develop and implement information security strategies and programs to protect organisational data and systems. 2. conduct regular risk assessments and develop risk management plans to mitigate security threats and vulnerabilities. 3. develop and oversee incident response plans and procedures to address security incidents promptly and effectively. 4. ensure compliance with relevant security standards, regulations, and laws through audits, assessments, and continuous monitoring. 5. collaborate with executive management to align information security initiatives with business objectives and priorities. 6. manage and mentor a team of cybersecurity professionals, providing guidance and support in security operations. 7. monitor emerging threats and trends in cybersecurity, implementing proactive measures to safeguard against potential risks. 8. evaluate and recommend security technologies, tools, and solutions to enhance the organisation's security posture. 9. conduct security awareness training and education programs for employees to promote a culture of cybersecurity awareness. 10. prepare and present regular reports on the organisation's security status, incidents, and mitigation efforts.
1. Ensure the delivery of high-quality services by establishing and monitoring performance standards and service level agreements (SLAs). 2. Build and maintain strong relationships with clients, promptly addressing their needs and resolving service-related issues. 3. Optimise service delivery processes to enhance efficiency and effectiveness, implementing continuous improvement practices. 4. Lead and develop the service delivery team, fostering a collaborative and high-performance work environment. 5. Develop and manage the service delivery budget, ensuring resources are allocated effectively to meet service targets and financial goals. 6. Implement service automation and digital transformation initiatives to streamline processes and improve service delivery speed and accuracy. 7. Conduct regular audits and quality assurance checks to ensure compliance with regulatory requirements and industry standards. 8. Analyse customer feedback and service performance data to identify trends, root causes of issues, and opportunities for service improvement. 9. Coordinate service escalations and crisis management efforts, ensuring timely resolution of critical incidents and minimising impact on service delivery.