IT Infrastructure Services Manager - Automotive Aftermarket Parts responsible for overseeing and managing the Company's information technology projects; co-ordinates phases from development to installation and acts as liaison between clients, vendors and consultants. Must have worked with a substant
This person will be accountable for analysing and implementing a best practice platform for the specific product range. Analyse existing solution and platform Investigate best practice alternatives to redesign the platform Develop a project plan and deliverables for the redesign of the platform Over
Our client is a large mining concern with mining activities in various sectors and provinces as well of the functions will include: Entity Management Mining Regulatory Processes Managing the Statutory Calendar of non-compliance in the governance space. Some mining industry experience would be beneficial, but is
applying strong expertise in machine learning, data mining and conducting information retrieval within a new
implementation of effective cyber defense and detection technologies Work with IT Ops on identified systems respond to and report on DLP, IPS/IDS, ATP, APT detection, help device on remediation actions and improvement business risk and the development effective threat detection systems Ensure and improve organisation's IT Security management. Performs cyber security protection and detection systems design, deployment, and enhancement. (1 and Nessus, unstructured data scanning, rogue detection etc. Pentest experience and exposure APT
applying strong expertise in machine learning, data mining and conducting information retrieval within a new making. Identify appropriate models / algorithms to mine large datasets and develop rich insights into member data analytics and machine learning techniques to detect fraudulent activity. Identify key trends and interact
be (but aren't limited to): Being the person your dog thinks you are :-D Assist product owner(s) with prioritization
fancy 3-5 years of technical Business Analysis - in dog years, that's well, still impressive Experience working
and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection with a focus on blue team operations, incident detection and response, and security monitoring. Proven
coordinated response to sophisticated cyber-attacks; detect threats and establish appropriate defensive mechanisms upgrades. •Conduct vulnerability assessments to detect current or possible breaches of electronic data reports for access control violations/intrusion detection, cybersecurity concerns, and malware threats.