Business Information Security Officer, ANZ
... executive teams around key divisional IT security and performance indicators. Ensure alignment with and promote the Global IT & Security Policy Manual (GITSPM), and corporate ...
... executive teams around key divisional IT security and performance indicators. Ensure alignment with and promote the Global IT & Security Policy Manual (GITSPM), and corporate ...
... tools. Contribute to discussions with security tool vendors and ensuring vendor licensing is being used appropriately and to it’s full extent. Maintaining a contextual ...
... tools. Contribute to discussions with security tool vendors and ensuring vendor licensing is being used appropriately and to it’s full extent. Maintaining a contextual ...
... key member of the Cyber Security Team and the broader IT team, you will be responsible ... business units. Develop and own IT security processes and procedures to ensure that security incidents and controls are managed ...
... addition to management of the security team on a BAU basis. The role works with the Security team members and corporate IT to ensure that the security controls implemented within the organisation ...
... addition to management of the security team on a BAU basis. The role works with the Security team members and corporate IT to ensure that the security controls implemented within the organisation ...
... to lead a team of IT security operations management professionals. You will ... and stakeholders. The newly formed security operations team are enabled to ensure that the security and compliance of our customers IT infrastructure, applications, and data is ...
... to lead a team of IT security operations management professionals. You will ... and stakeholders. The newly formed security operations team are enabled to ensure that the security and compliance of our customers IT infrastructure, applications, and data is ...
... qualifications you also have: Solid IT background and experience supporting the delivery of cyber information security and or information technology implementation ...
... metrics. Extensive knowledge of information security and technologies Significant experience in an IT environment In depth understanding of IT security control tools, e.g. CrowdStrike, ...