appropriate service providers (lift services, cleaning, security, airconditioning, electrical transformers, stand agreements Working knowledge of building maintenance Computer proficiency including MDA/MRI Property Management
providers, vendors and customers.
independently with RFQ processes from end to end. Securing venues and scheduling site inspection and briefing briefing meetings and recording minutes thereof. Securing venues and scheduling meetings for the Bid Specification collecting tenders at closing date and storing them securely Receiving e-mails from dedicated SCM mailbox.
independently with RFQ processes from end to end. Securing venues and scheduling site inspection and briefing briefing meetings and recording minutes thereof. Securing venues and scheduling meetings for the Bid Specification collecting tenders at closing date and storing them securely Receiving e-mails from dedicated SCM mailbox.
driver's license with no endorsement. Advanced Computer literacy: Microsoft word; Excel; Internet; Microsoft Personal Information for the purposes of potentially securing employment. As an applicant you agree to make information required for the purpose of potentially securing employment and you understand and agree that should
Code B (08) driver's license with no endorsement. Computer literacy: Microsoft word; Excel; Internet; Microsoft Personal Information for the purposes of potentially securing employment. As an applicant you agree to make information required for the purpose of potentially securing employment and you understand and agree that should
regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Technology / Electronic Engineering / and/ or Computer Science from a SAQA recognised institution. Certified Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
regulatory requirements, including data protection and security standards.
f) Create and provide relevant training
2. Secure knowledge
a) Keep abreast of all developments all stakeholders
e) Manage the process of securing and implementing training material
f) Monitor firms responses to client questionnaires
b) Secure appropriate responses to questions requiring specialist
firm f) Create and provide relevant training 2. Secure knowledge a) Keep abreast of all developments in changes to all stakeholders e) Manage the process of securing and implementing training material f) Monitor the firm's responses to client questionnaires b) Secure appropriate responses to questions requiring specialist