controls that can be deployed to manage third-party security risks. - Knowledge of key assurance certifications and assurance reports used in Information Security (e.g. ISAE3402, ISO27001, SOC2 reports etc.). - A good understanding of Data Protection regulations and the broader third-party management lifecycle will be highly advantageous. - Experience of More ❯
controls that can be deployed to manage third-party security risks. - Knowledge of key assurance certifications and assurance reports used in Information Security (e.g. ISAE3402, ISO27001, SOC2 reports etc.). - A good understanding of Data Protection regulations and the broader third-party management lifecycle will be highly advantageous. - Experience of More ❯
london, south east england, united kingdom Hybrid / WFH Options
DGH Recruitment
controls that can be deployed to manage third-party security risks. - Knowledge of key assurance certifications and assurance reports used in Information Security (e.g. ISAE3402, ISO27001, SOC2 reports etc.). - A good understanding of Data Protection regulations and the broader third-party management lifecycle will be highly advantageous. - Experience of More ❯
address financial and business process risks (purchase to pay risks) through process maps. -Experience of using, interpreting and evaluating of third-party reports e.g. (ISAE3402 reports) in accordance with ISA 402 for identified controls in support of financial audit teams. The ability to: -understand IT processes/technical documentation/ More ❯