Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: Matric registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
Supplier based in Midrand is looking for a Security Guard to join their team Minimum requirements: Matric registration required 1 Year experience as a Security Guard in a Retail environment required Must reside
rendering of security service deliver in line with SOPs
Computer Science, Information Technology, Cyber security or related field
monitor, and remediate ICT security issues.
QUALIFICATIONS System Administration Servers Security background Security updates Managing devices and what tools Linux, GNU, UNIX, Fedora, MAC, Android Microsoft Security Patches ABOUT US EXL is the indispensable partner QUALIFICATIONS System Administration Servers Security background Security updates Managing devices and what tools Linux, GNU, UNIX, Fedora, MAC, Android Microsoft Security Patches ABOUT US EXL is the indispensable partner
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
br />
JOB DESCRIPTION Key Responsibilities: The main purpose of the role is to design, implement and optimise business strategic processes and projects for TFG Design, Manufacturing and Prestige (Pty) Ltd. This role develops the technology roadmap to support the business initiatives and digitisation strat
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability