employ a talented Business Intelligence Business Analyst (BIBA) in Cape Town. The BIBA needs to gather, quality assurance; identifies and communicates all risks. Performs functional testing and data validation the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
employ a talented Business Intelligence Business Analyst (BIBA) in Cape Town. The BIBA needs to gather, quality assurance; identifies and communicates all risks. Performs functional testing and data validation the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
frameworks including security, legal, compliance, risk management etc. Ability to function well under pressure minimum of 5 years of IT experience Experience in Financial Services, Retail and Medical industry sectors needs of all parties involved, highlighting related risks, Stakeholder management, Project delivery, Solution enterprise/software/domain architects, business analysts, etc Deep analytical skills and the ability to the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
experience in implementing DLP solutions to mitigate risks associated with data loss or leakage. As a DLP specialist monitor and enforce data protection policies. Conduct risk assessments and security audits to identify vulnerabilities the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
experience in implementing DLP solutions to mitigate risks associated with data loss or leakage. As a DLP specialist monitor and enforce data protection policies. Conduct risk assessments and security audits to identify vulnerabilities the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
continuously performing vulnerability assessment and risk management Conduct incident management and root the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
continuously performing vulnerability assessment and risk management Conduct incident management and root the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
the handling of or access to cash, finances, financial systems, or confidential information; our recruitment
the handling of or access to cash, finances, financial systems, or confidential information; our recruitment