guidelines and processes to ensure compliance. As an Information Security Specialist, you will be responsible network and information systems against breaches, viruses, and Antispyware; • Upgrade systems by implementing and maintaining security controls; • Protect the system by defining access privileges, control structures resources; • Develop and implement standardised Information Security processes and procedures; • Respond managed and configured properly; • Ensure Information System compliance and conformance to IT policies
the southern hemisphere. Summary of role: Design systems that maximize productivity and increase efficiency co-ordinate and maintain all manufacturing information and systems. Co-ordinate the movement of raw/finished efficient ways to use people, machines, materials, information, and energy to make a product or service. Optimise manufacturing and information systems to meet requirements. Develop management control systems. Perform mathematical
Maintain an organised filing system for all suppliers as per supplier information retention policy. Process & maintenance of existing supplier master information on SYSPRO (e.g. payment terms, reporting codes
Planning Understand and optimise supply chain and systems. Understand internal and external factors which Data and Systems (Master Data BOMS, MOQ's, Rounding values leadtimes ETC). Collate Information and Assumptions
Planning Understand and optimise supply chain and systems. Understand internal and external factors which Data and Systems (Master Data BOMS, MOQ's, Rounding values leadtimes ETC). Collate Information and Assumptions
design Installing and configuring company computer systems Responding to client IT support requests/tickets simple correspondence. To effectively present information to other employees of the organization. The ability Knowledge of computer hardware and networking systems Knowledge of web services and IP-based protocols
5 years of experience in Linux based operating systems 2 years of experience in Docker or Kubernetes 5 installation,upgrades Upgrades of Redhat Linux systems Linux Kernel management and Upgrades Disk configuration extension and management of Redhat Linux Operating Systems LUKS encryption if disks Adding and modifying disks logical volumes Creating and modifying linux file systems LUKS encryption if disks iScsi configuration,setup Configuring Network services FTP,HTTP,BIND,LDAP System Security implementing Firewall Rules and IP tables
presenting and analyzing production and sales related information and reports, as and when required Assist with complaint registry and recording. Monitor the CCR system between various companies. Provide feedback where
presenting and analyzing production and sales related information and reports, as and when required Assist with complaint registry and recording. Monitor the CCR system between various companies. Provide feedback where
with all stakeholders. Log queries according to system procedures. Investigate route-cause of query. Resolving Prepare all payments on terms according to agreed system and procedure. Issue reconciliation with all supporting