Reference: HQ000830-pn-1 SPECIALISTS IN THE DISTRIBUTION AND STORAGE OF DANGEROUS GOODS IN SOUTH AFRICA. our client is an RTMS accredited company. Role: Workshop : Supervisor Location: Verulam, Durban, SA Key performance areas: Responsible for preventive maintenance of the fleet Responsible for repa
Durban SA is a Logistics specialist. Role: Stores Controller Location: Verulam Skills: Logistics industry Procurement Qualification. Procurement and Stores Controller experience. Transport and Truck spare parts knowledge
client is seeking to employ a meticulous Credit Controller with expertise in advanced debt collection techniques
competitive advantage for the organization Monitor and control asset expenses against approved budgets ensuring with business metrics and objectives Maintains control of the day to day procurement function by; negotiating
competitive advantage for the organization Monitor and control asset expenses against approved budgets ensuring with business metrics and objectives Maintains control of the day to day procurement function by; negotiating
and strengthen controls. KEY PERFORMANCE AREAS Implementation of Audit & Security Recommendations functionality. Disaster Recovery Backups Internal Network Security Network Environment End-User Support QUALIFICATIONS
Responsible for the performance, integrity and security of databases as well as being involved in the needs of users and monitoring user access and security; Monitoring performance and managing parameters definitions for the data dictionary (metadata) Controlling access permissions and privileges Developing operational staff to ensure database integrity and security Commissioning and installing new applications Logins as well as have strong knowledge in Database Security SSIS, SSRS and Analysis Services experience would
Firewall Working Principle and Security Design,WLAN principle and Wireless controller configuration Good understanding
task efficiency. KEY PERFORMNACE AREAS : Ensuring security updates are current across all systems. Running ensure the most secure approach is being employed. Developing systems for specialized security requirements responsive. Studying devices and implementing the best security protocols for everything from cell phones to tablets departments to ensure adherence to security protocols. Monitoring security administrations to ensure best
Design and maintain secure and reliable network architectures. Firewall and security planning and implementation