Minimum 1 year of work experience; background in technology is advantageous Strong organizational skills communication abilities A keen interest in Information Technology Proficiency in Microsoft Office suite Duties Minimum 1 year of work experience; background in technology is advantageous Strong organizational skills communication abilities A keen interest in Information Technology Proficiency in Microsoft Office suite Sandton
Azure and CI/CD Knowledge of containerization technologies such as Kubernetes and Docker Qualifications: significant impact in the world of investment technology, do not hesitate to apply now and embark on an positions. Do you have a friend who is a developer or technology specialist? We pay cash for successful referrals
Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders founders created to provide IT Services, Digital Technologies, Strategic Workforce, and Outsourcing in an effective core Java, as well as familiarity with related technologies and frameworks. Responsibilities: Design, implement
years, our client didn't become the world's leading food and beverages brand by chance. Perfection is at
years, our client didn't become the world's leading food and beverages brand by chance. Perfection is at
A JSE-listed company that sells innovative technology for mobile commerce to emerging markets in South Architect role Knowledge of the relevant Information Technology governance and legislative framework (such as
a holistic education that leverages modern technological advancements encourages lateral thinking, and years specialist subject teaching (Information Technology, Afrikaans, English, Accounting and Business
technical knowledge on cyber, its supporting technologies and processes. (preferred)
Preferred
Fraud
Headquartered in Palo Alto (California), C Ahead Technologies is an innovative brainchild of its founders founders created to provide IT Services, Digital Technologies, Strategic Workforce, and Outsourcing in an effective
completed a degree in Cybersecurity, Information Technology, Computer Science, or a related field. - Knowledge Familiarity with various security tools and technologies (e.g., firewalls, intrusion detection systems