Business Divisions Group Functions Your role Are you a data protection and cyber security risk SME... and background in all domains related to data protection, information security, risk and control management as well as secure...
? Are you passionate about technology and possess a solid business understanding of IT security, data confidentiality and data protection...Business Divisions Group Functions Your role Do you have experience with IT risk and security related topics...
days WFO Key Skills: CyberSecurity, IT risk management, compliance, information security governance, SOC Operations...-14 years of experience in cybersecurity, IT risk management, compliance, or information security governance, with 3...
Less than 5 years Do you have experience in Data privacy and protection? Yes No Do you have experience into IT risk... of risk controls into broader IT governance. 2. Security Operations & Incident Oversight Provide strategic direction...
),Azure AD Information Protection(AAIP) and Microsoft Defender for Identity (MDI), a cloud access security broker (CASB... focusses upon the provision of cyber security activities, aligning global cyber security risk reduction with local market...
, you will support the protection of IT systems and business data that are important to bp's operations. You will conduct security... team partners with the business to help them understand cyber risk and be accountable for cyber security. We're...
incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk... software Completes detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data...
incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk... software Completes detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data...
incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk... software Completes detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data...
information security plans to ensure protection, confidentiality, integrity, and availability of HPS Payment Services' data... action plans to ensure realistic and implementable security measures. Prepare and lead IT Risk Committees and ensure proper...
and implement IT risk management requirements in HPS Payment Services' projects. Ensure the integration of security measures in the.... Track IT security risk and performance indicators. Monitor the operational implementation of information security. Oversee...
incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk... software Completes detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
). Proficient in Information Security Risk Assessment, including Cloud, Data Centre, and Application Security. Familiar with OWASP... to evaluate security architecture and risk. Provide security requirements aligned with business and technical needs. Analyse...
records of processing activities. Conducting Data Protection Impact Assessments/Privacy Risk Assessments and providing risk... process. Supporting the legal team in markets to handle Data Subject Rights Requests (DSRs) and Privacy Risk Assessments...
-attacks, vulnerabilities, and other security threats, including protection of hardware, software, and data from unauthorised.... We are shaping the future of financial technology. Why not join us and make it happen here? Where will you be located...
log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security... assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7...