client site in Gauteng Requirements is as follows - Grade 12 Diploma in IT · A minimum of 2 years development Documentation and admin a. Document development b. Release process documentation Salary to be discussed
Qualifications: Grade 12 or relevant NQF level 4 qualification Relevant IT Certificate/Diploma Valid Code 8 (B) Drivers
PROVINCE MINIMUM ESSENTIAL QUALIFICATIONS : Matric B. Tech degree / National Diploma – Application Development visual elements Understanding and implementation of security and data protection Highly experience on all Frameworks with confidentiality and the highest level of security. Should you not be shortlisted for the vacancy visual elements Understanding and implementation of security and data protection Analyzing documentation and Server 2016 MINIMUM ESSENTIAL QUALIFICATIONS : Matric B. Tech degree / National Diploma – Application Development
ESSENTIAL QUALIFICATIONS : Matric National Diploma / B. Tech Degree in Application Development (ESSENTIAL) visual elements Understanding and implementation of security and data protection Highly experience on all Frameworks with confidentiality and the highest level of security. Should you not be shortlisted for the vacancy visual elements Understanding and implementation of security and data protection Analysing documentation and ESSENTIAL QUALIFICATIONS : Matric National Diploma / B. Tech Degree in Application Development (ESSENTIAL)
adherence to security and regulatory requirements.
Education:
analysers/interfaces/audio visual equipment. Qualifications: Grade 12 or relevant NQF level 4 qualification Relevant experience. Special Requirement: Must have a valid Code B (8) Drivers License Negotiable, dependent on Experience
producing quality solutions. Key Requirements B. Com Informatics/B. Engineering/ B.Sc. Agile or equivalent
experienced SOC Analyst Level 2 to join their Security Operations Center (SOC) team. The SOC Analyst role in monitoring, analyzing, and responding to security incidents to protect our clients organizational understanding of cybersecurity principles, experience with security tools and technologies, and the ability to work fast-paced environment. Monitor security alerts and events using SIEM (Security Information and Event Management) Management) tools and other security monitoring platforms. Analyze and investigate security incidents to determine
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security. Key Roles and Responsibilities: Proactively monitors information security incidents, Internet use and ICT policy breaches. Administers all security solutions solutions in the Information Security domain including, but not limited to, firewalls, IPS's, VPNs, Mail Gateways Access Control solutions, DNS clusters, Cloud security, mail and domain protection mechanisms such as
network infrastructure to ensure efficient and secure communication. This role involves collaborating ensuring network reliability, performance, and security.
Key Roles and Responsibilities
information security incidents, Internet use and ICT policy breaches.