seeking a Cloud Engineer to join our team. As a Cloud Engineer you'll be responsible MWARE vSAN Preferable
IT Engineer Hire Resolves client is currently seeking a highly skilled and motivated IT Engineer to join related field At least 3 years of experience in IT engineering or a related role Strong working knowledge of
Service Desk Engineers provide IT end-user support on various components of an IT environment, including
Automation Engineer - Remote Cloudbox > Automation Engineer Overview Cloudbox is a global IT managed do' attitude. Role Description The automation engineer role is aimed not only at Cloudbox internal requirements software/automation/development engineer. Location South Africa Hours The Automation Engineer will be expected to
Systems Engineer - Remote Cloudbox > Systems Support Engineer Position Overview Cloudbox is a global attitude Role Description The Systems Support Engineer is a key part of the Cloudbox service framework Pretoria, or Cape Town Shift Work The Systems Support Engineer will be expected to work standard 8 hour shifts
Services Company requires a skilled Cyber Security Engineer with expertise in penetration testing and AWS
have an open role for a Cloud Data Engineer to execute data engineering duties according to the standards
versatile team as a DevOps Engineer in the exciting Fintech space The DevOps Engineer plays a critical role Bachelor's Degree (NQF level 7) in Computer Science, Engineering, or related field. Preferred - Azure/AWS/K8s/Docker
in the Logistics sector is looking for a Citrix Engineer in the Kempton area. This is an onsite role and permissions and data security issues with the security engineer. Manage version migrations. Update programs and Advantage 5 years relevant experience in Citrix Engineering and Administration Minimum 8 years' experience
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / IPS), endpoint protection, and security information and event management (SIEM) solutions Monitor security alerts and logs to identify and investigate security incidents and indicators of compromise