POSITION: Contract until December 2026 EXPERIENCE: 4-6 Years related working experience. COMMENCEMENT: adherence. Ensuring that applications are compliant, secure, and operational, using tools such as CMDB, Active support to all GROUP markets, globally. Ticket and change request creation to service groups responsible device patching, license management. Knowledge of GROUP processes and tools beneficial.
POSITION: Contract until December 2026 EXPERIENCE: 4-6 Years related experience COMMENCEMENT: As soon as adherence. Ensuring that applications are compliant, secure, and operational, using tools such as CMDB, Active support to all GROUP markets, globally. Ticket and change request creation to service groups responsible device patching, license management. Knowledge of GROUP processes and tools beneficial.
experienced SOC Analyst Level 2 to join their Security Operations Center (SOC) team. The SOC Analyst role in monitoring, analyzing, and responding to security incidents to protect our clients organizational understanding of cybersecurity principles, experience with security tools and technologies, and the ability to work fast-paced environment. Monitor security alerts and events using SIEM (Security Information and Event Management) Management) tools and other security monitoring platforms. Analyze and investigate security incidents to determine
Degree (IT/Computer Science or similar) coupled with 4 -8 years of experience in the field of Software Development software, network performance & troubleshooting, security, and backups
s
SAP certified with a minimum of 4 years relevant experience.
Experience in OpenText strategies, ensuring seamless access, collaboration and security of business documents
Responsibilities:
Responsibilities:
optimising database performance, ensuring data security, and implementing best practices in Microsoft and standards, ensuring accuracy and consistency. 4. Troubleshooting and Resolution: Utilise troubleshooting apply them to enhance database performance and security. Requirements: 1. Database Management: Oversee enhance system efficiency. 3. Data Security: Implement robust security measures to protect sensitive data ensuring compliance with data protection regulations. 4. Best Practices Implementation: Drive the implementation
vehicle. 3. Absence of prior convictions on record. 4. Submission of authentic and unaltered ceretificates which alerts are received via syslog & siem (security information & event managements). • Implement internet access. • Ensure all infrastructure and security systems are up-to-date. • Manage technical aspect conduct quarterly DR tests. Cyber Security role • Source security software applications and successfully external security providers and online security systems to use. • Source and manage external security providers
experience. COMMENCEMENT: As soon as possible ROLE: GROUP set up an IT Initiative in 2019, in order to implement implement Privileged Account Management (PAM) across GROUP IT, that deals exclusively with the protection of solution design and roll-out of PAM within the GROUP Infrastructure. Hand in hand with a highly dynamic team consisting of members from Digital Identity, GROUP Financial Services, IT Infrastructure, and external PAM solution within the various Environments for GROUP IT. You will be required to evaluate the As Is Situation