agile, and more resilient to the changes in their operating environments. Our expert teams apply a mastery developing and executing ICT Infrastructure and Security roadmaps aligned with the Client's goals and objectives envisioning the future state of infrastructure and Security requirements within the Organization, identifying initiatives. Manage and implement ICT infrastructure and security, including network systems, servers, storage, cybersecurity. Oversee ICT infrastructure and security projects, ensuring adherence to timelines, budgets
Identifying variations and potential high risk areas in securing adherence to standards and procedures Recommending adherence to standards, procedures and quality control issues and activities Assisting in troubleshooting guidance and training in application software and operational procedures Analysing, evaluating and diagnosing printers, Internet, email, databases, operating systems and security systems Testing, identifying and diagnosing documentation such as procedural, instructional and operational guides and manuals, technical reports and specifications
defining business requirement specifications. Operational experience in a corporate channel environment communicate verbally and in writing. Knowledge of operating systems (Microsoft Windows) Data base proficiency advantageous. Sound knowledge of Information Security controls, concepts, and best practices is required solid understanding of technology and associated security risks. R800K P/A
Desktop Support is to oversee and manage the operations of the desktop support team, who provides technical also ensuring that the desktop support team is operating effectively and efficiently. The Head of End User the organization's IT infrastructure is reliable, secure, and meets the needs of it's clients, plan and mechanisms. ICT systems quality Ensure correct operations which comply fully with specific needs and outcomes outcomes in terms of the development, integration, security and overall management of ICT systems Improve
in the team responsible for the trusted operating system, secure network encryptors (layer 2/3), Public client-side applications developed for most popular operating systems. The favorable candidate must be comfortable and C++ on an operating system level. Good understanding of networking and network security is a must; knowledge environment) Good understanding of networking and network security Systematic and analytical approach to problem
our clients' security postures. - Assist in the development and implementation of security measures to assessments and penetration testing. - Analyze security breaches to identify the root cause and implement development of security policies, procedures, and guidelines. - Assist in the creation of security awareness - Knowledge of security frameworks and standards - Familiarity with various security tools and technologies - Basic understanding of network protocols, operating systems, and programming languages. - Strong analytical
is required Programming of Crestron and Extron control systems for Boardroom installations Being available and Extron programming non-negotiable Basic Room control experience. Audio experience including basic
required • Programming of Crestron and Extron control systems for Boardroom installations • Being available and Extron programming non-negotiable • Basic Room control experience. • Audio experience including basic
Install, configure, and update operating systems, applications, and security patches. Monitor system performance issues to ensure uninterrupted operation. Implement and enforce security measures to protect against unauthorized system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote networks, and security principles. Proficiency in administering Windows and/or Linux operating systems, virtualization protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills
Install, configure, and update operating systems, applications, and security patches. Monitor system performance issues to ensure uninterrupted operation. Implement and enforce security measures to protect against unauthorized system, and report faults. Manage system setup of security cameras. Remote desktop support for users in remote networks, and security principles. Proficiency in administering Windows and/or Linux operating systems, virtualization protocols, firewalls, VPNs, and other network security technologies. Excellent troubleshooting skills