DRIVER
EIGHTEEN (18) MONTHS FIXED-TERM
this role is to operate mobile clinics safely and securely to selected community sites as mentioned. Oversee
least 1-2 years experience as a driver
Responsibilities:
Hestony Transport currently holds a vacancy for a Driver: Light Duty Reporting to the Parts Manager, this required. Position Overview Specific Role Responsibilities Check vehicles for defects and ensure that Night Shift from 20h00 TO 05h00 Give Driver Training to drivers/customers on handover of new vehicles vehicles Complete all necessary reports for Driver Training given. Move vehicles between dealership/suppliers/customers Experience A minimum of Grade 12 Must have a valid driver’s Code 14(EC) license A valid PDP Skills and Personal
DRIVER
FIXED-TERM
for a 6 months fixed-term contract position of, Driver, to service across DTHF/C sites, as per schedule
assigned. The incumbent will be required for the secure transportation of goods, staff, and participants
that sites are equipped with adequate drivers when current drivers are on leave. The position is based
>Grade 12
The Lab Driver plays a crucial role in the efficient operation of laboratory logistics by safely transporting personnel to various destinations. The Lab Driver is responsible for ensuring the timely delivery of laboratory confidentiality and security measures when handling sensitive materials The post LABORATORY DRIVER appeared first
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to company Cyber Security Strategy across the company entity. Achieve and maintain and target Cyber Security Maturity cyber programmes Design, Develop and Implement a Security Programme for company No or per target Internal related to company for Cyber Security Ensure a Cyber Security Incident Response Practice is in place across
for a professional Principal Specialist: Cyber Security contract role for 12 months. Desirable: An industry and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. At Protection and Payment Card Industry (PCI)/Data Security Standard. High level understanding and Knowledge operating multiple security programs, projects, and initiatives and related security tooling An ability understanding of Tech Security risks and mitigating solutions A diverse security background with knowledge
3-to-5-year cyber security strategy across the company Achieve and maintain and target cyber security maturity programmers. Support the design, develop and implement a security programmer for the company No or per target Internal to the company for cyber security Ensure a cyber security incident response practice is in place across across the company Promote awareness of security policies, training, and the governance strategy amongst amongst all levels of the company to ensure sound security governance is reflected across the entity Actively
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data Information Security Specialist will be required to execute the following duties and responsibilities, but not Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control standardized Information Security processes and procedures. Timely response to internal and external